DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
Behavioral task
behavioral1
Sample
5c27467616eee5b44df966b5b55ae73e.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c27467616eee5b44df966b5b55ae73e.dll
Resource
win10v2004-20231215-en
Target
5c27467616eee5b44df966b5b55ae73e
Size
24KB
MD5
5c27467616eee5b44df966b5b55ae73e
SHA1
c00baf57949f8524761c82b561a0ae36d15d6b7e
SHA256
4355f3e6023dabe7696e208c582c51939d70e2a6ffad7e075c2b56a74f0c9240
SHA512
8987266338a3aa1eb66c3d324fc27566d51198b697354e3fd285e02a7b22499c5f1da7615e758e71a890adc48f4c2ef5187de8f0ce994676b8d0678f3ed29adf
SSDEEP
384:oSlPWzHE5+yiVtI89/rrtBiYTcJvu7JJZFX+lT6/ngOWD3AzurvP18D:F8DI8Z3fiYTMu7JElT6/nnurvtA
resource | yara_rule |
---|---|
sample | modiloader_stage2 |
Checks for missing Authenticode signature.
resource |
---|
5c27467616eee5b44df966b5b55ae73e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
MsgHookOff
MsgHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ