ServiceMain
Behavioral task
behavioral1
Sample
0a9bd621da46a0e097bfde3f6467d0ae.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a9bd621da46a0e097bfde3f6467d0ae.dll
Resource
win10v2004-20231215-en
General
-
Target
0a9bd621da46a0e097bfde3f6467d0ae
-
Size
79KB
-
MD5
0a9bd621da46a0e097bfde3f6467d0ae
-
SHA1
84556c0b1387c41326af1476b3266d970c4246f7
-
SHA256
e328e3c82c53014a6c5d82ac38a9df847274fff6cfb4cf982f7fd1c9394e1c4c
-
SHA512
2b7a3ed0c780135d06e63c4eebc3ea72c639efa4dfbe9d341a37032ae1590ca955b8795f3545ab16572fa24aa0a0115c40c07c72beda8151d86e417a20a6f8a8
-
SSDEEP
1536:OShSFg+gQsod09cNqHfG78HDa1k117mPw3sEk:Rh4g609Wq/G78ekr7mPw3sEk
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a9bd621da46a0e097bfde3f6467d0ae
Files
-
0a9bd621da46a0e097bfde3f6467d0ae.dll windows:4 windows x86 arch:x86
3b53121b382ecacdae9b97eeed59957b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateProcessA
MoveFileExA
GetTickCount
GetLocalTime
GetCurrentThreadId
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
InterlockedExchange
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetLastError
SetLastError
ExitThread
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
GetSystemDirectoryA
GetFileAttributesA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
TerminateThread
ResetEvent
WaitForSingleObject
SetEvent
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
lstrcpyA
GetWindowsDirectoryA
InitializeCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
RemoveDirectoryA
LocalAlloc
user32
GetWindowThreadProcessId
IsWindowVisible
OpenInputDesktop
CreateWindowExA
SendMessageA
IsWindow
CloseWindow
GetCursorPos
ReleaseDC
ExitWindowsEx
GetDC
GetSystemMetrics
SetRect
LoadCursorA
GetIconInfo
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
GetUserObjectInformationA
GetDesktopWindow
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
CallNextHookEx
EnumWindows
SetWindowsHookExA
UnhookWindowsHookEx
CloseDesktop
CloseWindowStation
PostMessageA
SetThreadDesktop
OpenDesktopA
MapVirtualKeyA
keybd_event
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
gdi32
CreateDIBSection
BitBlt
CreateHalftonePalette
CreateCompatibleDC
DeleteObject
DeleteDC
SelectObject
GetPaletteEntries
advapi32
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyA
RegQueryValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
GetTokenInformation
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
shlwapi
SHDeleteKeyA
msvcrt
strrchr
realloc
atoi
_except_handler3
strncpy
wcstombs
malloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strchr
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
_strcmpi
_beginthreadex
??3@YAXPAX@Z
calloc
ws2_32
inet_ntoa
send
recv
ntohs
socket
gethostbyname
getpeername
gethostname
getsockname
select
WSAStartup
WSACleanup
htons
connect
setsockopt
closesocket
msvcp60
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
dbghelp
MakeSureDirectoryPathExists
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileA
avicap32
capCreateCaptureWindowA
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ