ServiceMain
Behavioral task
behavioral1
Sample
afefa6927a755e3923bf5411ffbca6d21fadc601cc7674c3b17f1d5aeaf31c7d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afefa6927a755e3923bf5411ffbca6d21fadc601cc7674c3b17f1d5aeaf31c7d.dll
Resource
win10v2004-20221111-en
General
-
Target
afefa6927a755e3923bf5411ffbca6d21fadc601cc7674c3b17f1d5aeaf31c7d
-
Size
92KB
-
MD5
88f0fdad4bd7b9a84cc72bb821c57981
-
SHA1
95d5faad20e7b31779e89fa9835e6a8f79ce1936
-
SHA256
afefa6927a755e3923bf5411ffbca6d21fadc601cc7674c3b17f1d5aeaf31c7d
-
SHA512
250cfe9b1a5197b1ca94243741d3c283f22f76d2f5e4efe33493d452b4c43ee028cd03c09f22cf61c16a248bfa0c9312f3bf106bcf3e2ee2898baa1c6a3bc0f8
-
SSDEEP
1536:p1ON/fgDpl6NTMApNHtLM4c012fRTMteoZmznD3J:p1OOpKLTo4v1gRTMIkmznDZ
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
afefa6927a755e3923bf5411ffbca6d21fadc601cc7674c3b17f1d5aeaf31c7d.dll windows x86
3081e1acf05f86acd86cd1fc8a1eb9ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strstr
_ftol
ceil
realloc
malloc
atoi
memmove
__CxxFrameHandler
??3@YAXPAX@Z
strchr
??2@YAPAXI@Z
_CxxThrowException
wcstombs
wcsstr
wcscpy
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcsncat
wcschr
wcscat
_wcsnicmp
_snprintf
_errno
sprintf
strncpy
strncmp
wcslen
wcsrchr
_except_handler3
free
_wcsupr
mbstowcs
_strnicmp
kernel32
EnterCriticalSection
VirtualAlloc
ResetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenW
MultiByteToWideChar
OutputDebugStringW
lstrcpyW
GetVersionExW
GetFileAttributesW
CreateProcessW
DeleteFileW
CloseHandle
ReadFile
GetFileSize
CreateFileW
lstrcatW
GetSystemDirectoryW
ReleaseMutex
OpenEventW
SetErrorMode
CreateMutexA
GetTickCount
SetUnhandledExceptionFilter
CopyFileW
SetFileAttributesW
FreeConsole
GetLastError
GetModuleFileNameW
GetProcAddress
LoadLibraryW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
LeaveCriticalSection
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileW
lstrcmpW
LocalReAlloc
FindFirstFileW
LocalAlloc
RemoveDirectoryW
SetFilePointer
WriteFile
MoveFileW
GetLocalTime
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
LocalSize
TerminateProcess
OpenProcess
GetCurrentProcess
lstrcmpiW
GetCurrentThreadId
CreateEventW
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
SetEvent
WaitForSingleObject
CreateDirectoryW
TerminateThread
DeleteFileA
user32
OpenDesktopW
GetThreadDesktop
GetUserObjectInformationW
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
DispatchMessageW
TranslateMessage
GetMessageW
wsprintfW
SetProcessWindowStation
OpenWindowStationW
GetProcessWindowStation
PostMessageW
FindWindowW
CharNextW
GetWindowTextW
GetForegroundWindow
GetAsyncKeyState
GetKeyState
ExitWindowsEx
EnumWindows
LoadCursorW
DestroyCursor
BlockInput
SystemParametersInfoW
SendMessageW
keybd_event
MapVirtualKeyW
SetCapture
WindowFromPoint
GetClipboardData
gdi32
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueW
OpenSCManagerW
OpenServiceW
ChangeServiceConfigW
ControlService
StartServiceW
CloseServiceHandle
RegisterServiceCtrlHandlerW
SetServiceStatus
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegEnumKeyExW
RegDeleteValueW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegDeleteKeyW
CloseEventLog
ClearEventLogW
OpenEventLogW
RegCreateKeyExW
RegEnumValueW
shell32
ShellExecuteW
SHGetFileInfoA
ws2_32
ioctlsocket
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
inet_addr
getsockname
inet_ntoa
gethostname
ntohs
select
closesocket
recv
send
wininet
InternetOpenUrlW
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetGetConnectedState
avicap32
capGetDriverDescriptionW
msvcp60
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?_Xran@std@@YAXXZ
?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ
?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z
?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z
psapi
GetModuleFileNameExW
EnumProcessModules
Exports
Exports
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ