DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
0c1f0270c1f1af4c429b3425cb32828a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c1f0270c1f1af4c429b3425cb32828a.dll
Resource
win10v2004-20231222-en
Target
0c1f0270c1f1af4c429b3425cb32828a
Size
48KB
MD5
0c1f0270c1f1af4c429b3425cb32828a
SHA1
942b85ede659364a8cc60a6020269ba215761673
SHA256
d49631f2f407027af16c22100c139f132f0bb84f6c4316e6aa8465953de6f1a7
SHA512
1f7b29d22df4ef6c8c991d0fd78ef31d820efda49d4f84e4041797ce4f8113ba71eccdee5457fdf89b8d6b8b96774d48c0871894ba5257e24ee3b117b4257cfd
SSDEEP
768:6mpM8NHn9/NyvOSj71F3Wl31TCU2txOwV8JtFqidNbh3Rc3iN:6aLf4Oi1F3PtAFJtFd5N
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
0c1f0270c1f1af4c429b3425cb32828a |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ