Fuck
Behavioral task
behavioral1
Sample
480-212-0x0000000000830000-0x000000000085D000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
480-212-0x0000000000830000-0x000000000085D000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
480-212-0x0000000000830000-0x000000000085D000-memory.dmp
-
Size
180KB
-
MD5
622f8a4f4317714cb1ee994fb54ecddc
-
SHA1
cef3bc5ba54d2ba0c6cbd2cb7f2bd1f69c29cca5
-
SHA256
7719d65cf8979f662bf7146e0e28668884e6cf3a2ebd5640349a54979eeb4085
-
SHA512
08b0b64c6b303224452435ffcb3e04e25aaeb9b6a26cecff649a121e4a08b7ea20ede3cdbfcdc1cc6a78d79fed464927f7f4fc38b1d1082363db075d1c8e711c
-
SSDEEP
3072:Pct9ecBwUyUAdyqx6wLzQ9zz5+gatjtE4tn66W1psaq:Pcjec836wvQLcOS66Wv
Malware Config
Extracted
gh0strat
27.124.41.180
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
480-212-0x0000000000830000-0x000000000085D000-memory.dmp.dll windows x86
4142048c24ca149e52124f6b2a99ee60
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
send
closesocket
recv
select
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
kernel32
UnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetExitCodeProcess
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
IsBadWritePtr
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalAlloc
LocalReAlloc
lstrcpynA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
lstrcmpA
GlobalFlags
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetOEMCP
GetACP
GetCPInfo
HeapSize
SetUnhandledExceptionFilter
SetLastError
TlsFree
TlsAlloc
GetVersion
GetCommandLineA
ExitThread
TlsGetValue
TlsSetValue
GetCurrentThreadId
HeapReAlloc
RaiseException
RtlUnwind
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapFree
VirtualProtect
GetProcessHeap
HeapAlloc
GlobalMemoryStatusEx
GetModuleHandleA
GetLastError
CreateProcessA
GetProcAddress
GetCurrentProcess
FreeLibrary
ReadFile
ExitProcess
GetVersionExA
GetTickCount
WinExec
LocalAlloc
LocalSize
LocalFree
GetModuleFileNameA
GetFileAttributesA
CopyFileA
MoveFileExA
CreateDirectoryA
SetFileAttributesA
LoadLibraryA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
lstrcatA
GetLocalTime
GetSystemDirectoryA
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
WriteFile
CreateThread
OutputDebugStringA
lstrcpyA
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
VirtualFree
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
LoadStringA
GetLastInputInfo
GetSystemMetrics
ChangeDisplaySettingsA
FindWindowA
GetClassNameA
GetWindow
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
wsprintfA
GetClientRect
gdi32
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
CloseServiceHandle
SetTokenInformation
CreateProcessAsUserA
StartServiceCtrlDispatcherA
RegQueryValueA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenProcessToken
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
DuplicateTokenEx
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
comctl32
ord17
urlmon
URLDownloadToFileA
wininet
InternetGetConnectedState
Exports
Exports
Sections
.text Size: 100KB - Virtual size: 8.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 8.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 8.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 8.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ