MyLive
Behavioral task
behavioral1
Sample
3966e6680d12a5b96e2c9bbdebf2a0f1c205c4320d32bddc9e7a1c070b6a59ce.dll
Resource
win7-20220812-en
General
-
Target
3966e6680d12a5b96e2c9bbdebf2a0f1c205c4320d32bddc9e7a1c070b6a59ce
-
Size
140KB
-
MD5
9f85cfcee13be73fcfb6867399e3dc91
-
SHA1
d32285e3331b6304635ec40d0a7050f1211d6aef
-
SHA256
3966e6680d12a5b96e2c9bbdebf2a0f1c205c4320d32bddc9e7a1c070b6a59ce
-
SHA512
98a06195f09ed33de75aac3417a350c177839cb1161b75c20d3365fbb0ca3107035a4ccc777b2ca7cd3cd9731de4d6db1c5ab9a30ef84d7b152306896718d80d
-
SSDEEP
3072:oapbbApqx100ljo6bgBvoyFH6uZZuSMgzdG8bf1If0TtkfAi4x7u:oapGr0VQzcKzEYf1S0T0AO
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
3966e6680d12a5b96e2c9bbdebf2a0f1c205c4320d32bddc9e7a1c070b6a59ce.dll windows x86
14b3f2e4f6963e2b2f4de136bfabad08
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
_initterm
_onexit
__dllonexit
calloc
_beginthreadex
wcstombs
realloc
strncat
printf
time
srand
rand
_snprintf
wcscpy
_errno
strncmp
atoi
strncpy
strrchr
_except_handler3
free
malloc
strchr
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
_strcmpi
_strrev
_strnicmp
??2@YAPAXI@Z
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
mfc42
ord2764
ord4129
ord6648
ord537
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
kernel32
WideCharToMultiByte
GetCurrentThreadId
lstrcmpiA
GetComputerNameA
CreateMutexA
SetErrorMode
OpenEventA
GetSystemInfo
GlobalMemoryStatusEx
WaitForMultipleObjects
PeekNamedPipe
TerminateProcess
DisconnectNamedPipe
CreatePipe
GetStartupInfoA
OutputDebugStringA
LocalSize
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
UnmapViewOfFile
HeapAlloc
CreateFileMappingA
MapViewOfFile
GetProcessHeap
HeapFree
GetLocalTime
MoveFileExA
GetTickCount
ExitThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
Beep
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
GetProcAddress
LoadLibraryA
CloseHandle
WaitForSingleObject
SetEvent
CreateThread
VirtualFree
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
lstrlenA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
MultiByteToWideChar
RaiseException
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
msvfw32
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICOpen
Exports
Exports
Sections
.text Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ