Behavioral task
behavioral1
Sample
dbeaf01e15bed0608afa7b524fb09785d61409a0b7f79b76fd9377fe9606e6bf.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dbeaf01e15bed0608afa7b524fb09785d61409a0b7f79b76fd9377fe9606e6bf.dll
Resource
win10v2004-20221111-en
General
-
Target
dbeaf01e15bed0608afa7b524fb09785d61409a0b7f79b76fd9377fe9606e6bf
-
Size
75KB
-
MD5
beadcc45530d8a92f37ffd1ff912a480
-
SHA1
ecf65296ab4cb378a38e30f13576794ddca8c4a9
-
SHA256
dbeaf01e15bed0608afa7b524fb09785d61409a0b7f79b76fd9377fe9606e6bf
-
SHA512
2830ab651b803233887d4f25ca66c01d33ecb51561e97c213e824f10d9d97fda1da889bace4fe223aa18e1487b0c5fa06234cd67987a40ad8676f6bc049cb29e
-
SSDEEP
1536:dFDMbbMt9ODnjfiwKcuybfLIeEwKJB4AY4eEtUreOv3/DRI:dFIMDODn+wKByrLIeNKJBZ2EtEeOv3/1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
dbeaf01e15bed0608afa7b524fb09785d61409a0b7f79b76fd9377fe9606e6bf.dll windows x86
34be880a9d6a1790ccc81f71a32d59c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
FreeLibrary
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
WritePrivateProfileStringA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
CancelIo
LoadLibraryA
GetPrivateProfileStringA
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
CreateThread
DisableThreadLibraryCalls
SetThreadPriority
InterlockedExchange
SetEvent
InitializeCriticalSection
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetProcAddress
user32
MessageBoxA
wsprintfA
ExitWindowsEx
advapi32
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
ShellExecuteA
msvcrt
_initterm
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
sprintf
exit
strtok
printf
_beginthreadex
atoi
rand
strchr
srand
strncpy
strcspn
free
malloc
calloc
??1type_info@@UAE@XZ
_adjust_fdiv
ws2_32
socket
ntohs
recv
closesocket
select
send
inet_addr
gethostbyname
sendto
WSASocketA
htonl
gethostname
WSACleanup
WSAStartup
htons
connect
setsockopt
inet_ntoa
WSAIoctl
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ