Behavioral task
behavioral1
Sample
5a766d8eed315f6a4a9d9452cac989cf.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a766d8eed315f6a4a9d9452cac989cf.dll
Resource
win10v2004-20231222-en
General
-
Target
5a766d8eed315f6a4a9d9452cac989cf
-
Size
112KB
-
MD5
5a766d8eed315f6a4a9d9452cac989cf
-
SHA1
ff7fa6e78d76a5f86191fa9f9d4ec8ab857bf8f5
-
SHA256
79f6c2d1df9ef48204a6a1be0dcaa529b761a769541b9d612da1e35617075ba5
-
SHA512
21e48d741f35cb1ab057de8ae61018784ef7b630fdcb595f7456c63012cfe483b0d6d839933edcb1497c7c7522d4fcfe875c7a739ccef29cd515f02a541dfd8e
-
SSDEEP
3072:uh3flbZ6sUJWPtKhXhCIqXS/Aum7t0j8J2V:CFZ6sxt6hT6CAum7u8J2V
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
5a766d8eed315f6a4a9d9452cac989cf.dll windows:4 windows x86 arch:x86
e3a2d2f629ef8be9b2f9172198cf6047
Code Sign
96:20:30:5c:b3:8f:56:02:3e:4b:16:98:d7:d4:a8:d5:89:4f:85:e8Signer
Actual PE Digest96:20:30:5c:b3:8f:56:02:3e:4b:16:98:d7:d4:a8:d5:89:4f:85:e8Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
msvcrt
_wcsnicmp
_snprintf
_errno
sprintf
strncpy
strncmp
wcslen
wcsrchr
_except_handler3
free
fopen
fseek
fread
fwrite
fputc
wcscat
_wcsupr
mbstowcs
wcscpy
wcsstr
wcstombs
strchr
atoi
malloc
realloc
_CxxThrowException
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
__CxxFrameHandler
_strnicmp
wcschr
wcsncat
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
fclose
??2@YAPAXI@Z
kernel32
CreateMutexA
RaiseException
FreeLibrary
GetCurrentThreadId
GetProcAddress
OpenProcess
TerminateProcess
LocalSize
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetLocalTime
MoveFileW
WriteFile
SetFilePointer
ReadFile
CreateFileW
GetFileSize
RemoveDirectoryW
LocalAlloc
FindFirstFileW
LocalReAlloc
lstrcmpW
FindNextFileW
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessW
GetFileAttributesW
CreateDirectoryW
DeleteFileW
WideCharToMultiByte
GetModuleFileNameW
GetLastError
CreateEventW
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
InterlockedExchange
GetTempPathW
CancelIo
Sleep
lstrlenW
MultiByteToWideChar
Process32NextW
lstrcmpiW
Process32FirstW
CreateToolhelp32Snapshot
lstrcpyW
GetVersionExW
lstrcatW
GetCurrentProcess
GetWindowsDirectoryW
ReleaseMutex
OpenEventW
SetErrorMode
LoadLibraryA
GetTickCount
SetUnhandledExceptionFilter
FreeConsole
CopyFileW
GetSystemDirectoryW
msvfw32
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
msvcp60
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEAAEPBG@Z
?_Eos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXI@Z
?_Split@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
Exports
Exports
ServiceMain
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ