Launch
Behavioral task
behavioral1
Sample
ade381478dc8a316641bd32272757a582626bef2eda3ed45bc0d3d40a0bdeb9a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ade381478dc8a316641bd32272757a582626bef2eda3ed45bc0d3d40a0bdeb9a.dll
Resource
win10v2004-20220812-en
General
-
Target
ade381478dc8a316641bd32272757a582626bef2eda3ed45bc0d3d40a0bdeb9a
-
Size
102KB
-
MD5
43a7231f118bdd618d6ebc959f8a96f0
-
SHA1
914688be8faa2d110d4d7664c896c8103580c1d7
-
SHA256
ade381478dc8a316641bd32272757a582626bef2eda3ed45bc0d3d40a0bdeb9a
-
SHA512
377e2ab6380a66f7743f74490ebec58c828c527237e35bb0d9af2d535c63cbfa193e98d0ea47efe8912c52b918cf5be30936ddd597d4cef9a1d9adb6348f0f96
-
SSDEEP
1536:AUJ1cB1NZD8ADVgVFNwcdk0fiAeyakuukE9KBzDzypBTi:AUw3/UNwykmiAeZukE9KBLypM
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
ade381478dc8a316641bd32272757a582626bef2eda3ed45bc0d3d40a0bdeb9a.dll windows x86
3f171bd44f90b9268f825ea8c6b1d076
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
lstrcpyA
SetEvent
CancelIo
ResetEvent
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDiskFreeSpaceExA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
DeleteFileA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
DeviceIoControl
GlobalMemoryStatus
GetVersionExA
OpenEventA
SetErrorMode
OutputDebugStringA
GetShortPathNameA
CopyFileA
DeleteCriticalSection
CreateThread
CreateMutexA
GetCurrentThreadId
GetSystemDirectoryA
GetStartupInfoA
GetWindowsDirectoryA
GetCurrentProcess
FreeLibrary
OpenProcess
InitializeCriticalSection
GetLocalTime
Process32Next
Process32First
ExitProcess
TerminateThread
ResumeThread
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
CreatePipe
LocalSize
CreateToolhelp32Snapshot
lstrcmpiA
GetTempPathA
LoadLibraryA
GetProcAddress
GetTickCount
Sleep
InterlockedExchange
CloseHandle
GetModuleFileNameA
WaitForSingleObject
RaiseException
gdi32
CreateDIBSection
SelectObject
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
msvcrt
atoi
exit
_iob
strncmp
strncpy
sprintf
_errno
_beginthreadex
strrchr
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_strupr
_strnicmp
??3@YAXPAX@Z
_except_handler3
malloc
free
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
calloc
??2@YAPAXI@Z
winmm
waveInStop
waveInReset
waveInUnprepareHeader
waveInClose
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveOutWrite
waveInGetNumDevs
waveInStart
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
Exports
Exports
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ