ServiceMain
Behavioral task
behavioral1
Sample
1227a3c301020c1f5549cd97ca44df58.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1227a3c301020c1f5549cd97ca44df58.dll
Resource
win10v2004-20231215-en
General
-
Target
1227a3c301020c1f5549cd97ca44df58
-
Size
81KB
-
MD5
1227a3c301020c1f5549cd97ca44df58
-
SHA1
81d3e36f4876afa022494fd820a6e159e1f530a3
-
SHA256
544efd8af9f5fb0b397f8ec54350302725460592d7fa96f759e73357680a89ef
-
SHA512
c7a8b5e6f57eec787fa1186c59e16d35a86e694f1f05f4f8aeb3f35384e25c32df4469afb1e1448071dc2cea7379985da6def4eea10486902f92186fe0eb619a
-
SSDEEP
1536:j3juL3Pd5mW36qSDwhcKSTfmw8RTAYRbJPLonkXa:j3sPWpXwhlSzmw8uYRbJPLonk
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1227a3c301020c1f5549cd97ca44df58
Files
-
1227a3c301020c1f5549cd97ca44df58.dll windows:4 windows x86 arch:x86
f0007a7860713bccc1060b766955d7f6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateProcessA
MoveFileExA
GetTickCount
GetLocalTime
GetModuleHandleA
GetCurrentThreadId
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
InterlockedExchange
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetLastError
SetLastError
ExitThread
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
GetSystemDirectoryA
GetFileAttributesA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
TerminateThread
lstrcpyA
ResetEvent
WaitForSingleObject
SetEvent
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
InitializeCriticalSection
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
RemoveDirectoryA
LocalAlloc
user32
EnumWindows
GetWindowThreadProcessId
ExitWindowsEx
OpenInputDesktop
IsWindow
CloseWindow
GetCursorPos
ReleaseDC
CreateWindowExA
GetUserObjectInformationA
GetSystemMetrics
SetRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
GetDC
GetDesktopWindow
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
IsWindowVisible
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
CloseDesktop
CloseWindowStation
PostMessageA
SystemParametersInfoA
SendMessageA
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
gdi32
CreateCompatibleDC
GetPaletteEntries
SelectObject
DeleteObject
DeleteDC
BitBlt
CreateDIBSection
CreateHalftonePalette
advapi32
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyA
RegQueryValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
strrchr
realloc
atoi
_except_handler3
strncpy
wcstombs
malloc
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strchr
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
_strcmpi
ceil
memmove
_beginthreadex
??3@YAXPAX@Z
free
ws2_32
htons
setsockopt
gethostbyname
select
socket
gethostname
getsockname
send
WSAStartup
WSACleanup
closesocket
recv
ntohs
connect
msvcp60
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
dbghelp
MakeSureDirectoryPathExists
imm32
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileA
avicap32
capCreateCaptureWindowA
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Exports
Exports
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.shared Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ