Skip Navigation

Shellcodes

These indicators represent situations where a small piece of code is used as the payload in the exploitation of a software vulnerability. It is called shellcode because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode.
Indicator
Description
ApiHashing
The file contains a byte sequence that looks like shellcode that tries to stealthily find library APIs loaded in memory.
BlackholeV2
The file looks like it might have come from the Blackhole exploit kit.
ComplexGotoEmbed
The file may be able to force the browser to go to an address or to perform an action.
ComplexSuspiciousHeaderLocation
The PDF header is located at a non-zero offset which may indicate an attempt to prevent this file from being recognized as a PDF document.
EmbeddedTiff
The file may contain a crafted TIFF image with nop-sled to facilitate exploitation.
EmbeddedXDP
The file likely contains another PDF as an XML Data Package (XDP).
FindKernel32Base1
The file contains a byte sequence that looks like a shellcode that tries to locate kernel32.dll in memory.
FindKernel32Base2
The file contains a byte sequence that looks like a shellcode that tries to locate kernel32.dll in memory.
FindKernel32Base3
The file contains a byte sequence that looks like a shellcode that tries to locate kernel32.dll in memory.
FunctionPrologSig
The file contains a byte sequence that is a typical function prolog, and likely contains shellcode.
GetEIP1
The file contains a byte sequence that looks like a shellcode that resolves its own address to locate other things in memory and facilitate exploitation.
GetEIP4
The file contains a byte sequence that looks like a shellcode that resolves its own address to locate other things in memory and facilitate exploitation.
IndirectFnCall1
The file contains a byte sequence that looks like an indirect function call, and is likely shellcode.
IndirectFnCall2
The file contains a byte sequence that looks like an indirect function call, and is likely shellcode.
IndirectFnCall3
The file contains a byte sequence that looks like an indirect function call, and is likely shellcode.
SehSig
The file contains a byte sequence that is typical for Structured Exception Handling (SEH), and likely contains shellcode.
StringLaunchActionBrowser
The file may be able to force the browser to go to an address or to perform an action.
StringLaunchActionShell
The file may be able to execute shell actions.
StringSingExploit
The file might contain an exploit.