Skip to content

Latest commit

 

History

History
24 lines (18 loc) · 949 Bytes

README.md

File metadata and controls

24 lines (18 loc) · 949 Bytes

MapDetection

Detect manualmapped images remotely, without hassle

Confirmed Detections

  • Extreme Injector -> detected
  • Xenos -> detected (even with Add Loader reference enabled)

How does it work?

MapDetection has two modes, deep and quick.

Quick mode

Iterates every process thread, collecting allocation bases from thread starts and instruction pointers. It then scans every unique allocation base for any anomalies.

Deep mode

Run quick scan, then traverse the virtual memory space for any executable pages that do not belong to a module. (Will lead to false positives)

Anomalies MapDetection looks for

  • Valid PE headers (MZ signature, PE magic bytes and architecture)
  • Module is linked correctly to module list
  • Valid allocation type (MEM_IMAGE)
  • Valid allocation flags

Example of a manually mapped, possibly malicious, image that was picked up by MapDetection

Map Detection