DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
Behavioral task
behavioral1
Sample
49ddadc7f25cfba525d469efd23a4ba2.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49ddadc7f25cfba525d469efd23a4ba2.dll
Resource
win10v2004-20231215-en
Target
49ddadc7f25cfba525d469efd23a4ba2
Size
55KB
MD5
49ddadc7f25cfba525d469efd23a4ba2
SHA1
315191de585e2a885f4c6123193fa09fd29a7012
SHA256
e7a7955a3a1aff33eb56e7bfe33a6f4ff61cca3bac32dddca79b8a0bfe9c1871
SHA512
493238fa9029869ac58029230d63720018b2a17255a43856b98f2adf7fa519bbed088b0e1f1493df74c29ac5cfe217118b50b4458abf13aa00c276d7f0f72a7b
SSDEEP
768:9C0qiQf+Eb5GB0eEunl0lmd9iHCjMATQCm6cmtJyYL6IYl995jSHmHBZBAnQ99Re:s0qiQWEV00lmd9iHCj/TQX6jBLae
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
49ddadc7f25cfba525d469efd23a4ba2 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
JmpHookOff
JmpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ