DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
0a9e3fbc2fd18326b30072e9e84ef853.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a9e3fbc2fd18326b30072e9e84ef853.dll
Resource
win10v2004-20231215-en
Target
0a9e3fbc2fd18326b30072e9e84ef853
Size
87KB
MD5
0a9e3fbc2fd18326b30072e9e84ef853
SHA1
646aad9a59096cac8ced3be2605e4ef572ab4c50
SHA256
6971493a9243b542bb1a68781a05684297ee1d615626aaaf30209113cfde9019
SHA512
8c35fe913f4f9b5d558bcc17bac234742c1d04991bd950cf697f741bddaf10cf470aa33503014e3bab3abf8443307c1e8297feff2024fb298d8f0ba579ded23c
SSDEEP
1536:L9qZQI0DMrqooT/W5vD92jc2Rg4N9vrPsh3OL3D8Iu89K0g:s0DsIQOcygK9DPjNK0g
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
0a9e3fbc2fd18326b30072e9e84ef853 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ