StudyHard
Behavioral task
behavioral1
Sample
1a55bc212b09f610842c4cbd9272d72f5c99b3673a4b463ed1fde01dff538152.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
1a55bc212b09f610842c4cbd9272d72f5c99b3673a4b463ed1fde01dff538152.dll
Resource
win10v2004-20231025-en
General
-
Target
1a55bc212b09f610842c4cbd9272d72f5c99b3673a4b463ed1fde01dff538152
-
Size
84KB
-
MD5
d6c85de051700ef276cda57d75f1555a
-
SHA1
274371a07fdc9435b2ea04ab862784f6b919732a
-
SHA256
1a55bc212b09f610842c4cbd9272d72f5c99b3673a4b463ed1fde01dff538152
-
SHA512
e566442ff36be1b4da1e3b485cbb1374261cf392b6fb6f4b6a13c04eeb5cff819162f8ed9b07638ff6b637098a81d457937cc3d99861c37eb5f0885ece8b9012
-
SSDEEP
1536:YTsenhY8kwtuwL7hSm1Rh+wIOdnToIfAUfe7GHE:UsEY8mwnhS1mVTBfAUfVHE
Malware Config
Extracted
gh0strat
127.0.0.1
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a55bc212b09f610842c4cbd9272d72f5c99b3673a4b463ed1fde01dff538152
Files
-
1a55bc212b09f610842c4cbd9272d72f5c99b3673a4b463ed1fde01dff538152.dll windows:4 windows x86 arch:x86
2221c0107b5e2205969c1e2018e65d34
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcatA
CopyFileA
GetModuleFileNameA
CreateProcessA
ExpandEnvironmentStringsA
lstrcpyA
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateThread
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
DeleteFileA
GetTickCount
LocalAlloc
ReadFile
HeapAlloc
GetProcessHeap
VirtualProtect
HeapFree
GetSystemInfo
lstrcmpiA
GetLocalTime
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetVersionExA
WinExec
GetFileAttributesA
CreateDirectoryA
ReleaseMutex
CreateMutexA
MoveFileExA
MoveFileA
SetFileAttributesA
Process32Next
Process32First
OutputDebugStringA
CreateThread
ExitProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemDirectoryA
GetFileSize
SetFilePointer
lstrlenA
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
GlobalAlloc
GetLastError
LocalFree
SetLastError
CreateFileA
DeviceIoControl
WriteFile
CloseHandle
Sleep
GetVersion
GetCurrentProcess
FindFirstFileA
VirtualFree
FindNextFileA
GlobalLock
GlobalUnlock
VirtualAlloc
LoadLibraryW
user32
GetMessageA
EnumWindows
IsWindowVisible
SendMessageA
MessageBoxA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
PostThreadMessageA
GetInputState
GetLastInputInfo
SetClipboardData
CloseClipboard
GetClipboardData
OpenClipboard
ExitWindowsEx
EmptyClipboard
wsprintfA
GetWindowTextA
advapi32
OpenProcessToken
CloseEventLog
RegOpenKeyExA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
DeleteService
OpenServiceA
OpenSCManagerA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
ClearEventLogA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
SHChangeNotify
ole32
CoInitialize
CoUninitialize
CoCreateGuid
ws2_32
socket
getsockname
gethostname
send
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
select
recv
closesocket
msvcrt
_strcmpi
_CxxThrowException
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_beginthreadex
_except_handler3
strncmp
sprintf
_stricmp
_snprintf
printf
strcspn
strncpy
atoi
_access
strrchr
malloc
free
realloc
rand
strstr
_strupr
??2@YAPAXI@Z
exit
__CxxFrameHandler
_ftol
??3@YAXPAX@Z
setupapi
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyA
SetupDiSetClassInstallParamsA
iphlpapi
GetIfTable
urlmon
URLDownloadToFileA
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ