🛠️Loader

The following piece of C code is a simple example of DLL loader, where the DLL holds the malicious shellcode.

#include <iostream>
#include <Windows.h>

int main(void) {
  HMODULE hMod = LoadLibrary("shellcode.dll");
  if (hMod == nullptr) {
    cout << "Failed to load shellcode.dll" << endl;
  }

  return 0;
}

Once the payload is completed, pe-sieve can be used to identify if it is stealthy or not.

Last updated

Was this helpful?