Shellcodes

These indicators represent situations where a small piece of code is used as the payload in the exploitation of a software vulnerability. It is called shellcode because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode.

Indicator

Description

ApiHashing

The file contains a byte sequence that looks like shellcode that tries to stealthily find library APIs loaded in memory.

BlackholeV2

The file looks like it might have come from the Blackhole exploit kit.

ComplexGotoEmbed

The file may be able to force the browser to go to an address or to perform an action.

ComplexSuspiciousHeaderLocation

The PDF header is located at a non-zero offset which may indicate an attempt to prevent this file from being recognized as a PDF document.

EmbeddedTiff

The file may contain a crafted TIFF image with nop-sled to facilitate exploitation.

EmbeddedXDP

The file likely contains another PDF as an XML Data Package (XDP).

FindKernel32Base1

The file contains a byte sequence that looks like a shellcode that tries to locate kernel32.dll in memory.

FindKernel32Base2

The file contains a byte sequence that looks like a shellcode that tries to locate kernel32.dll in memory.

FindKernel32Base3

The file contains a byte sequence that looks like a shellcode that tries to locate kernel32.dll in memory.

FunctionPrologSig

The file contains a byte sequence that is a typical function prolog, and likely contains shellcode.

GetEIP1

The file contains a byte sequence that looks like a shellcode that resolves its own address to locate other things in memory and facilitate exploitation.

GetEIP4

The file contains a byte sequence that looks like a shellcode that resolves its own address to locate other things in memory and facilitate exploitation.

IndirectFnCall1

The file contains a byte sequence that looks like an indirect function call, and is likely shellcode.

IndirectFnCall2

The file contains a byte sequence that looks like an indirect function call, and is likely shellcode.

IndirectFnCall3

The file contains a byte sequence that looks like an indirect function call, and is likely shellcode.

SehSig

The file contains a byte sequence that is typical for Structured Exception Handling (SEH), and likely contains shellcode.

StringLaunchActionBrowser

The file may be able to force the browser to go to an address or to perform an action.

StringLaunchActionShell

The file may be able to execute shell actions.

StringSingExploit

The file might contain an exploit.