ServiceMain
Behavioral task
behavioral1
Sample
90e0a8e2cc8a3c8cdf1feca35f57aba10a0b25d5d3d9cc65ca465491ba5612a9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
90e0a8e2cc8a3c8cdf1feca35f57aba10a0b25d5d3d9cc65ca465491ba5612a9.dll
Resource
win10v2004-20220812-en
General
-
Target
90e0a8e2cc8a3c8cdf1feca35f57aba10a0b25d5d3d9cc65ca465491ba5612a9
-
Size
11KB
-
MD5
ce49ef9ddb3a96e5b9373991d45a38bb
-
SHA1
d0ef36c653b215d6639976389b53480faeb5ad3d
-
SHA256
90e0a8e2cc8a3c8cdf1feca35f57aba10a0b25d5d3d9cc65ca465491ba5612a9
-
SHA512
2a8084306f6cafda88b96086af5cd2c79a626eb8429f644c9dd0355d35bd243e449659c6de84ed79f494a88dc87848abc01543e1abd638d958575409b414a063
-
SSDEEP
192:LVX9oHgDgZHZjLfSlLsGXIaD7WRZXcVMVmrysHoXEA0VZ0Vc6ImSph9iM:RNkgUZ5nSWcMZMuVmrys2EACV6I19
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
90e0a8e2cc8a3c8cdf1feca35f57aba10a0b25d5d3d9cc65ca465491ba5612a9.dll windows x86
c4c0b1e9c817032859e7d27465e36674
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
ResetEvent
GetFileAttributesA
lstrcatA
GetWindowsDirectoryA
SetEvent
CreateEventA
CancelIo
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
SetLastError
FreeConsole
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
user32
wsprintfA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
SetServiceStatus
RegOpenKeyExA
RegisterServiceCtrlHandlerA
msvcrt
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
fclose
fwrite
fopen
??2@YAPAXI@Z
atoi
strncpy
wcstombs
_beginthreadex
strncat
strchr
_except_handler3
realloc
malloc
free
_initterm
_adjust_fdiv
_strnicmp
ws2_32
WSACleanup
WSAIoctl
setsockopt
connect
htons
WSAStartup
socket
select
recv
closesocket
send
gethostbyname
Exports
Exports
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 618B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ