DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
29554de18af20e45bd8f0dd4cd0ac824.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29554de18af20e45bd8f0dd4cd0ac824.dll
Resource
win10v2004-20231222-en
Target
29554de18af20e45bd8f0dd4cd0ac824
Size
33KB
MD5
29554de18af20e45bd8f0dd4cd0ac824
SHA1
20516079ab816420da3f78f91a03c894cc5f1c02
SHA256
84128870bf2985be385d16a3d6ed3c0ec0ec392111a53b103b226453fc8dda69
SHA512
2183478dc4faf6af28abbd3d7a53a69cc44e5d2004f4e3c25ee5153575c4900b7eb8b77ac9b067e2e3136efc7ec113cba9def5fe9127a57f2d85ddf238baaf65
SSDEEP
768:mKSAqu5O0GQ/aToYmR1qf4eHGXiHMUrKbDFpdDl/V2j:SAqu5O0GQ/aToxFeHGryeFnI
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
29554de18af20e45bd8f0dd4cd0ac824 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ