StudyHard
Behavioral task
behavioral1
Sample
3008-134-0x0000000010000000-0x0000000010015000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3008-134-0x0000000010000000-0x0000000010015000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
3008-134-0x0000000010000000-0x0000000010015000-memory.dmp
-
Size
84KB
-
MD5
aa3b881dc994c6c9623871522c00ce7f
-
SHA1
c8cad6004ee1b8ba259abfc0e7b886d2ec5be33b
-
SHA256
376d8e50d3d52f8084abe1ca56733d6bcd04db0ee5e2bc2d22b4af6333d457b1
-
SHA512
757fde7079b27765a3ebde3a2c2574f3a02dd4228e7bfeb99c0480fc842d6d175dabdc8fe19561d13b799c8e92e28f517058a12d171abba5f405f3921721a20d
-
SSDEEP
1536:iTsenhY8kwtuwL7hSm1Rh7IOdnToIfAUfeMGHE:SsEY8mwnhSqVTBfAUfKHE
Malware Config
Extracted
gh0strat
81.68.216.37
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
3008-134-0x0000000010000000-0x0000000010015000-memory.dmp.dll windows x86
2221c0107b5e2205969c1e2018e65d34
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
CopyFileA
GetModuleFileNameA
CreateProcessA
ExpandEnvironmentStringsA
lstrcpyA
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateThread
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
DeleteFileA
GetTickCount
LocalAlloc
ReadFile
HeapAlloc
GetProcessHeap
VirtualProtect
HeapFree
GetSystemInfo
lstrcmpiA
GetLocalTime
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetVersionExA
WinExec
GetFileAttributesA
CreateDirectoryA
ReleaseMutex
CreateMutexA
MoveFileExA
MoveFileA
SetFileAttributesA
Process32Next
Process32First
OutputDebugStringA
CreateThread
ExitProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemDirectoryA
GetFileSize
SetFilePointer
lstrlenA
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
GlobalAlloc
GetLastError
LocalFree
SetLastError
CreateFileA
DeviceIoControl
WriteFile
CloseHandle
Sleep
GetVersion
GetCurrentProcess
FindFirstFileA
VirtualFree
FindNextFileA
GlobalLock
GlobalUnlock
VirtualAlloc
LoadLibraryW
user32
GetMessageA
EnumWindows
IsWindowVisible
SendMessageA
MessageBoxA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
PostThreadMessageA
GetInputState
GetLastInputInfo
SetClipboardData
CloseClipboard
GetClipboardData
OpenClipboard
ExitWindowsEx
EmptyClipboard
wsprintfA
GetWindowTextA
advapi32
OpenProcessToken
CloseEventLog
RegOpenKeyExA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
DeleteService
OpenServiceA
OpenSCManagerA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
ClearEventLogA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
SHChangeNotify
ole32
CoInitialize
CoUninitialize
CoCreateGuid
ws2_32
socket
getsockname
gethostname
send
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
select
recv
closesocket
msvcrt
_strcmpi
_CxxThrowException
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_beginthreadex
_except_handler3
strncmp
sprintf
_stricmp
_snprintf
printf
strcspn
strncpy
atoi
_access
strrchr
malloc
free
realloc
rand
strstr
_strupr
??2@YAPAXI@Z
exit
__CxxFrameHandler
_ftol
??3@YAXPAX@Z
setupapi
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyA
SetupDiSetClassInstallParamsA
iphlpapi
GetIfTable
urlmon
URLDownloadToFileA
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 256.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 256.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 256.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 256.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ