GetLogController
Behavioral task
behavioral1
Sample
917d343929269d7070b2868a792c43224a19621affc4422d81dc50ff073a594d.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
917d343929269d7070b2868a792c43224a19621affc4422d81dc50ff073a594d.dll
Resource
win10v2004-20221111-en
General
-
Target
917d343929269d7070b2868a792c43224a19621affc4422d81dc50ff073a594d
-
Size
128KB
-
MD5
90f92512f9a64015670afb88626657a2
-
SHA1
4872025812dc04f1ec5da0d7de344f14710c434d
-
SHA256
917d343929269d7070b2868a792c43224a19621affc4422d81dc50ff073a594d
-
SHA512
98f71aa1fadc0d6c23f68612e740b93b3dfac77b3ffa5d8e39161dbc3a2cf82be6656baf1957f3583e9e94bfd950d57deb701f39712c55d7ff900aa099c92442
-
SSDEEP
3072:XmIWBggp/8T+XD5K+6FO5aVbSx5EWtN1IBlpaEmSt:YgtqdK+kgWSTftN1Clpa
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
917d343929269d7070b2868a792c43224a19621affc4422d81dc50ff073a594d.dll windows x86
6f58f1ed6a66b49c5f9b4467e89c5f7c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleHandleA
GlobalMemoryStatusEx
GetSystemInfo
OpenEventA
CreateMutexA
OutputDebugStringA
OpenProcess
GetCurrentProcess
VirtualFreeEx
lstrcpynA
WideCharToMultiByte
ReadProcessMemory
VirtualAllocEx
GetSystemDefaultLCID
GetWindowsDirectoryA
GetComputerNameA
GlobalMemoryStatus
lstrcmpiA
GetCurrentThreadId
LoadLibraryA
GetProcAddress
lstrcatA
DisableThreadLibraryCalls
GetModuleFileNameA
GetSystemDirectoryA
ExitProcess
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
CreateThread
GetLocalTime
GetTickCount
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
TerminateThread
MultiByteToWideChar
FreeLibrary
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateProcessA
GetVersionExA
RaiseException
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
SetErrorMode
InitializeCriticalSection
user32
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
CloseDesktop
FindWindowA
FindWindowExA
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
CloseWindow
SetClipboardData
CloseClipboard
CharNextA
wsprintfA
SetThreadDesktop
MessageBoxA
ExitWindowsEx
GetWindowTextA
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
EnumWindows
GetKeyState
GetAsyncKeyState
IsWindow
EmptyClipboard
GetForegroundWindow
gdi32
DeleteDC
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
DeleteObject
BitBlt
advapi32
QueryServiceStatus
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
StartServiceA
OpenServiceA
OpenSCManagerA
ControlService
RegSetValueExA
RegDeleteValueA
RegOpenKeyA
DeleteService
ChangeServiceConfigA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
SetNamedSecurityInfoA
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
QueryServiceConfigA
EnumServicesStatusA
GetUserNameA
CloseServiceHandle
shell32
ShellExecuteA
SHGetFileInfoA
msvcrt
atoi
strrchr
strncmp
strchr
_errno
wcscpy
strncat
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_except_handler3
_strcmpi
malloc
free
strncpy
sprintf
rand
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
_beginthreadex
_strrev
_strupr
_strnset
_strnicmp
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
wininet
InternetGetConnectedState
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
psapi
GetModuleFileNameExA
EnumProcessModules
Exports
Exports
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ