Skip to content

vmcall/MapDetection

Repository files navigation

MapDetection

Detect manualmapped images remotely, without hassle

Confirmed Detections

  • Extreme Injector -> detected
  • Xenos -> detected (even with Add Loader reference enabled)

How does it work?

MapDetection has two modes, deep and quick.

Quick mode

Iterates every process thread, collecting allocation bases from thread starts and instruction pointers. It then scans every unique allocation base for any anomalies.

Deep mode

Run quick scan, then traverse the virtual memory space for any executable pages that do not belong to a module. (Will lead to false positives)

Anomalies MapDetection looks for

  • Valid PE headers (MZ signature, PE magic bytes and architecture)
  • Module is linked correctly to module list
  • Valid allocation type (MEM_IMAGE)
  • Valid allocation flags

Example of a manually mapped, possibly malicious, image that was picked up by MapDetection

Map Detection

About

Detect manualmapped images remotely, without hassle

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages