MainDLLEntryPoint
Behavioral task
behavioral1
Sample
aa92f65def527de28f2f6e956e4b4849b1e5e441919df86139e96221101a828b.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aa92f65def527de28f2f6e956e4b4849b1e5e441919df86139e96221101a828b.dll
Resource
win10v2004-20230915-en
General
-
Target
aa92f65def527de28f2f6e956e4b4849b1e5e441919df86139e96221101a828b
-
Size
180KB
-
MD5
019231ec771e7404a8df6aacc002fbea
-
SHA1
a6ff0f4d8e8174e69b2e737f2908836f520e0efc
-
SHA256
aa92f65def527de28f2f6e956e4b4849b1e5e441919df86139e96221101a828b
-
SHA512
075e3afd8213833a163d7ab6e46286deeb9b71b1dd4e857db181591438485e20e7b625cae7bb200e9c34d208aebe2458eaad32570fee3bb1fb69d7c64629bb75
-
SSDEEP
3072:RblTMtIkyV+gXwabnWpXje3htTBfdMFw67+:RbmOk5+wCngXyRtTB1+L+
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa92f65def527de28f2f6e956e4b4849b1e5e441919df86139e96221101a828b
Files
-
aa92f65def527de28f2f6e956e4b4849b1e5e441919df86139e96221101a828b.dll windows:4 windows x86
c97e769927d036ef8afbeeb4357bbe9f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_strnicmp
_strcmpi
_strupr
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_snprintf
_beginthreadex
atol
_mbscmp
_mbsstr
wcscpy
wcstombs
wcslen
mbstowcs
_errno
strncmp
realloc
strncat
_splitpath
_iob
memmove
strrchr
_except_handler3
free
malloc
time
srand
strchr
sprintf
strstr
strcspn
strncpy
atoi
rand
_CxxThrowException
??2@YAPAXI@Z
exit
__CxxFrameHandler
_ftol
ceil
??3@YAXPAX@Z
shlwapi
PathUnquoteSpacesA
PathRemoveArgsA
PathGetArgsA
PathFindFileNameA
kernel32
WriteFile
DeviceIoControl
CreateFileA
SetLastError
LocalFree
GetLastError
GlobalAlloc
CreateEventA
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
CancelIo
GetTickCount
ExitThread
CreateThread
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetSystemDirectoryA
TerminateProcess
CreateProcessA
VirtualFree
GetPrivateProfileSectionNamesA
GetWindowsDirectoryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
HeapFree
GetProcessHeap
HeapAlloc
HeapReAlloc
VirtualProtect
IsBadReadPtr
LocalAlloc
LocalReAlloc
ReadFile
GetFileSize
GetFileAttributesA
LocalSize
SetFilePointer
DeleteFileA
CreateDirectoryA
GetDriveTypeA
GetDiskFreeSpaceExA
CloseHandle
GetLogicalDriveStringsA
FindClose
RemoveDirectoryA
MoveFileA
FileTimeToSystemTime
GetFileAttributesExA
GetStartupInfoA
TerminateThread
Process32Next
Process32First
CreateToolhelp32Snapshot
MoveFileExA
GetTempPathA
GetModuleFileNameA
GetLocalTime
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GlobalFree
GlobalSize
lstrcmpiA
GetCurrentThreadId
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
GetModuleHandleA
LoadLibraryW
Sleep
GetSystemInfo
OpenEventA
CreateMutexA
OutputDebugStringA
lstrcpyW
GlobalMemoryStatusEx
WinExec
Module32Next
Module32First
CreateRemoteThread
OpenProcess
DisableThreadLibraryCalls
GetVersion
GetCurrentProcess
FindFirstFileA
FindNextFileA
GlobalLock
GlobalUnlock
GetVolumeInformationA
VirtualAlloc
lstrlenA
GlobalMemoryStatus
user32
OpenClipboard
ExitWindowsEx
SetClipboardData
MessageBoxA
wsprintfA
CharNextA
GetWindowTextA
EnumWindows
GetForegroundWindow
EmptyClipboard
CloseClipboard
GetClipboardData
SetRect
PostMessageA
OpenDesktopA
IsWindowVisible
GetWindowThreadProcessId
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
EnumDisplaySettingsA
GetSystemMetrics
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SystemParametersInfoA
SendMessageA
BlockInput
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
gdi32
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDIBSection
advapi32
StartServiceA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
OpenEventLogA
ClearEventLogA
CloseEventLog
LsaClose
LookupAccountNameA
IsValidSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHGetFileInfoA
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysFreeString
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiCallClassInstaller
SetupDiSetClassInstallParamsA
SetupDiGetDeviceRegistryPropertyA
ws2_32
WSACleanup
WSAIoctl
setsockopt
connect
ioctlsocket
__WSAFDIsSet
WSAStartup
listen
accept
getpeername
bind
ntohs
recv
closesocket
select
socket
gethostbyname
htons
recvfrom
getsockname
WSAGetLastError
gethostname
inet_ntoa
WSASocketA
htonl
sendto
inet_addr
send
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
mfc42
ord535
ord536
ord939
ord6876
ord3663
ord2818
ord6143
ord354
ord5186
ord665
ord4204
ord2915
ord5442
ord5572
ord6874
ord2764
ord1979
ord356
ord858
ord537
ord922
ord2770
ord2781
ord4058
ord3178
ord1980
ord4215
ord3324
ord3310
ord3010
ord3304
ord6282
ord2763
ord4278
ord6662
ord4129
ord2784
ord6283
ord940
ord801
ord5440
ord6383
ord5450
ord6394
ord3181
ord941
ord6883
ord668
ord2614
ord860
ord3811
ord800
ord541
ord540
ord5710
urlmon
URLDownloadToFileA
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
netapi32
NetApiBufferFree
NetUserSetInfo
NetUserGetLocalGroups
NetUserGetInfo
NetUserEnum
NetLocalGroupAddMembers
NetUserDel
NetUserAdd
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSEnumerateSessionsA
WTSQuerySessionInformationW
WTSLogoffSession
WTSDisconnectSession
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ