ServiceMain
Behavioral task
behavioral1
Sample
1e8163781aa2717e429fc5fe6d8252c38a06885b1c062bee1b323ee80095c279.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e8163781aa2717e429fc5fe6d8252c38a06885b1c062bee1b323ee80095c279.dll
Resource
win10v2004-20220812-en
General
-
Target
1e8163781aa2717e429fc5fe6d8252c38a06885b1c062bee1b323ee80095c279
-
Size
76KB
-
MD5
05657f05cbbedb5ec10380ee893f92cd
-
SHA1
69e30e230cb25f2713f891b775187e2d2a163495
-
SHA256
1e8163781aa2717e429fc5fe6d8252c38a06885b1c062bee1b323ee80095c279
-
SHA512
90c8f972fd92af9e98e2676c1e20c360411dc86cc3f19a4575291843d183637f55b54c2d6a8ba6e71cfd87756f28e3aece2b87a271f104bdf73015bc900fe66b
-
SSDEEP
1536:qkFTtUjMdSnnGEDfSha5fc6tYPlfsCemKsvEqqaPK:qI0GSnnzShkfhiPdsCebwEqqaPK
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
1e8163781aa2717e429fc5fe6d8252c38a06885b1c062bee1b323ee80095c279.dll windows x86
c0cafc2a66a006b60a045e91adacc31f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
CreateThread
ResetEvent
SetEvent
InterlockedExchange
CancelIo
DeleteFileA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetLastError
SetLastError
GetSystemDirectoryA
CreateDirectoryA
WriteFile
GetCurrentProcessId
MoveFileA
lstrcatA
RemoveDirectoryA
TerminateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
FindClose
CreateProcessA
OpenProcess
LocalAlloc
lstrcmpiA
GetCurrentThreadId
GetCurrentProcess
DuplicateHandle
FindFirstFileA
FindNextFileA
GetFileAttributesA
FreeConsole
SetErrorMode
SetUnhandledExceptionFilter
lstrcpyA
CreateMutexA
GetTickCount
Sleep
OpenEventA
ReleaseMutex
WaitForSingleObject
CloseHandle
CreateToolhelp32Snapshot
Process32First
Process32Next
GetVersionExA
LoadLibraryA
GetProcAddress
InitializeCriticalSection
FreeLibrary
lstrlenA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
MoveFileExA
user32
wsprintfA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
SetServiceStatus
RegisterServiceCtrlHandlerA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
msvcrt
atoi
strchr
??2@YAPAXI@Z
printf
__CxxFrameHandler
strstr
strncpy
realloc
malloc
_CxxThrowException
strrchr
_except_handler3
strncat
_beginthreadex
calloc
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_strnicmp
_ftol
ceil
memmove
??3@YAXPAX@Z
_itoa
_stricmp
wcstombs
ws2_32
getsockname
gethostname
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
send
closesocket
recv
socket
select
gethostbyname
msvcp60
??0Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??1Init@ios_base@std@@QAE@XZ
Exports
Exports
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ