StudyHard
Behavioral task
behavioral1
Sample
1376-54-0x0000000010000000-0x0000000010015000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1376-54-0x0000000010000000-0x0000000010015000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
1376-54-0x0000000010000000-0x0000000010015000-memory.dmp
-
Size
84KB
-
MD5
ae9212b9676494d2b0c5d130f3563c17
-
SHA1
8a11f7c7962bdad4650f4f213c8686468b2a7a5b
-
SHA256
74c8d1e6a13ce450a783ebfc0a5c326fd9c3dc38aa8c3c81ae8d5a0d30df3e2a
-
SHA512
81bfc1a489ca4e092d8a8ec93a0fee1c3b7fe3c514ed2d67783d6cfdcbf3b1d88054a1f7d2f233de1d3b10a330bb358ac6bbf29b181265fa51cc025c3fbb2875
-
SSDEEP
1536:iTsenhY8kwtuwL7hSm1RhoIOdnToIfAUfegGHE:SsEY8mwnhStVTBfAUfeHE
Malware Config
Extracted
gh0strat
156.236.72.163
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1376-54-0x0000000010000000-0x0000000010015000-memory.dmp
Files
-
1376-54-0x0000000010000000-0x0000000010015000-memory.dmp.dll windows x86
2221c0107b5e2205969c1e2018e65d34
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
CopyFileA
GetModuleFileNameA
CreateProcessA
ExpandEnvironmentStringsA
lstrcpyA
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateThread
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
DeleteFileA
GetTickCount
LocalAlloc
ReadFile
HeapAlloc
GetProcessHeap
VirtualProtect
HeapFree
GetSystemInfo
lstrcmpiA
GetLocalTime
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetVersionExA
WinExec
GetFileAttributesA
CreateDirectoryA
ReleaseMutex
CreateMutexA
MoveFileExA
MoveFileA
SetFileAttributesA
Process32Next
Process32First
OutputDebugStringA
CreateThread
ExitProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemDirectoryA
GetFileSize
SetFilePointer
lstrlenA
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
GlobalAlloc
GetLastError
LocalFree
SetLastError
CreateFileA
DeviceIoControl
WriteFile
CloseHandle
Sleep
GetVersion
GetCurrentProcess
FindFirstFileA
VirtualFree
FindNextFileA
GlobalLock
GlobalUnlock
VirtualAlloc
LoadLibraryW
user32
GetMessageA
EnumWindows
IsWindowVisible
SendMessageA
MessageBoxA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
PostThreadMessageA
GetInputState
GetLastInputInfo
SetClipboardData
CloseClipboard
GetClipboardData
OpenClipboard
ExitWindowsEx
EmptyClipboard
wsprintfA
GetWindowTextA
advapi32
OpenProcessToken
CloseEventLog
RegOpenKeyExA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
DeleteService
OpenServiceA
OpenSCManagerA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
ClearEventLogA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
SHChangeNotify
ole32
CoInitialize
CoUninitialize
CoCreateGuid
ws2_32
socket
getsockname
gethostname
send
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
select
recv
closesocket
msvcrt
_strcmpi
_CxxThrowException
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_beginthreadex
_except_handler3
strncmp
sprintf
_stricmp
_snprintf
printf
strcspn
strncpy
atoi
_access
strrchr
malloc
free
realloc
rand
strstr
_strupr
??2@YAPAXI@Z
exit
__CxxFrameHandler
_ftol
??3@YAXPAX@Z
setupapi
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyA
SetupDiSetClassInstallParamsA
iphlpapi
GetIfTable
urlmon
URLDownloadToFileA
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 256.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 256.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 256.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 256.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ