fuckyou
fuckyou1
Behavioral task
behavioral1
Sample
1044-1-0x0000000010000000-0x0000000010017000-memory.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1044-1-0x0000000010000000-0x0000000010017000-memory.dll
Resource
win10v2004-20230915-en
Target
1044-1-0x0000000010000000-0x0000000010017000-memory.dmp
Size
92KB
MD5
71226684dd7e144e1e513af88dc89c6a
SHA1
839a1baa020cc119c0018b9f8f32357000ee37fd
SHA256
95b3f83e453c5a026a8eabc873c6bd5777d61bcb2186c75c25c4fe122ad116fc
SHA512
b9e18deec2e641350cd8b3a468ea941da270cc38d5595cf7c55054d2847afb57bc3a93a8609bdf7ac220564760c8e19b21e2673f85d291d8d2d8efa28c776762
SSDEEP
1536:uFeqajGayQBKTiGInFFkFp5jlbqRqNvhYCn5:8eqaYQBK21FsxqSvGi5
gh0strat
182.42.105.12
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
1044-1-0x0000000010000000-0x0000000010017000-memory.dmp |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
lstrcpyA
lstrcatA
GetSystemDirectoryA
TerminateProcess
CreateProcessA
lstrlenA
SetFilePointer
GetFileSize
GetLocalTime
ExpandEnvironmentStringsA
GetVersionExA
ExitProcess
GetModuleFileNameA
Process32Next
OpenProcess
Process32First
OutputDebugStringA
WinExec
CopyFileA
TerminateThread
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
DeleteFileA
GetProcAddress
LocalAlloc
GetComputerNameA
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
ReadFile
HeapAlloc
GetProcessHeap
VirtualProtect
HeapFree
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemInfo
lstrcmpiA
LoadLibraryW
GetFileAttributesA
CreateDirectoryA
ReleaseMutex
CreateMutexA
MoveFileExA
MoveFileA
SetFileAttributesA
GetCurrentThreadId
FreeLibrary
CreateThread
ExitThread
GetTickCount
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
GlobalAlloc
GetLastError
LocalFree
SetLastError
CreateFileA
DeviceIoControl
WriteFile
CloseHandle
Sleep
GetVersion
GetCurrentProcess
FindFirstFileA
FindNextFileA
VirtualFree
GlobalLock
GlobalUnlock
VirtualAlloc
LocalSize
GetLastInputInfo
GetSystemMetrics
EnumWindows
GetMessageA
SendMessageA
MessageBoxA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
wsprintfA
EmptyClipboard
SetClipboardData
PostThreadMessageA
GetInputState
IsWindowVisible
ExitWindowsEx
CloseClipboard
GetClipboardData
OpenClipboard
OpenProcessToken
OpenEventLogA
ClearEventLogA
CloseEventLog
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenServiceA
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
RegOpenKeyExA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
SetServiceStatus
RegisterServiceCtrlHandlerA
RegSetValueExA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
DeleteService
SHChangeNotify
SHGetSpecialFolderPathA
ShellExecuteExA
CoInitialize
CoCreateGuid
CoUninitialize
inet_addr
inet_ntoa
gethostname
WSAGetLastError
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
select
recv
closesocket
send
WSASocketA
sendto
htonl
getsockname
_strupr
??2@YAPAXI@Z
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_beginthreadex
_except_handler3
strncmp
_snprintf
_access
strrchr
free
realloc
malloc
time
srand
strchr
sprintf
strstr
strcspn
strncpy
atoi
rand
_CxxThrowException
_stricmp
exit
__CxxFrameHandler
_ftol
??3@YAXPAX@Z
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
SetupDiSetClassInstallParamsA
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyA
GetIfTable
URLDownloadToFileA
WTSQuerySessionInformationA
WTSFreeMemory
fuckyou
fuckyou1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ