Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
shellcode_dumped.bin
Resource
win10-20240221-en
3 signatures
300 seconds
General
-
Target
shellcode_dumped.bin
-
Size
681B
-
MD5
2280241dc8c25066b40ac98ca4a6a67a
-
SHA1
78517d2144b407ef220053b4f1579730b527ff38
-
SHA256
ca427b48b46e150ed7a88cd1365392459788a6316b7d4544c5421781e60bd3e1
-
SHA512
c88b460b752f739a258a57582a7489181897823f8520a239c039c99adf7f7909230e8a024ca5ce10580073beddfd0e22a4eacae9286f3f0d34772e8ecbf8498b
Score
9/10
Malware Config
Signatures
-
This rule detects the Shellcode code pattern injected into memory to generate the decryption keystream. 1 IoCs
This rule detects the Shellcode code pattern injected into memory to generate the decryption keystream.
resource yara_rule sample lb_keystream_shellcode
Files
-
shellcode_dumped.bin