ServiceMain
Behavioral task
behavioral1
Sample
1e3ed0d2e3aaf4b97051d1cc994e8b7b.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1e3ed0d2e3aaf4b97051d1cc994e8b7b.dll
Resource
win10v2004-20231215-en
General
-
Target
1e3ed0d2e3aaf4b97051d1cc994e8b7b.exe
-
Size
74KB
-
MD5
1e3ed0d2e3aaf4b97051d1cc994e8b7b
-
SHA1
a44e09ba00e863fedb14b6f815b41ff76e27be07
-
SHA256
48ff133b16607b935466c53e2a786b29f172ce5efb1eb53343ea5cf53087f9ab
-
SHA512
3ce961f4a558aacf243fdcb6910c068c4d4f8d452897a8052b18c16f8ad4ae21cb725b79b5c777153251514339b06298d52de7e7fa1f3aee90ee14f5e9648318
-
SSDEEP
1536:87Hg/MF22hP2CkJDb/HojcjZNfiMuhM/nuW/SV4ZqdA:87HgX2Atoj4Z1iMuO/nuW/SV4ZqdA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1e3ed0d2e3aaf4b97051d1cc994e8b7b.exe
Files
-
1e3ed0d2e3aaf4b97051d1cc994e8b7b.exe.dll windows:4 windows x86 arch:x86
cda5abbe1c1a0319d1f0e378b82ca183
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MoveFileExA
MoveFileA
GetTickCount
GetSystemDirectoryA
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
GetStartupInfoA
CreatePipe
TerminateThread
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetVersionExA
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
OpenProcess
WriteProcessMemory
InitializeCriticalSection
CreateRemoteThread
GetCurrentProcess
SetLastError
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
DeleteFileA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
DisconnectNamedPipe
user32
OpenInputDesktop
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
CloseDesktop
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
mouse_event
SetCursorPos
CharNextA
PostMessageA
SetProcessWindowStation
OpenDesktopA
wsprintfA
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
gdi32
CreateCompatibleBitmap
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
advapi32
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
InitializeSecurityDescriptor
AllocateAndInitializeSid
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
RegisterServiceCtrlHandlerA
shell32
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
_except_handler3
strrchr
strncpy
strncat
strchr
realloc
atoi
malloc
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
free
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
wcstombs
_strnicmp
_strcmpi
ws2_32
closesocket
recv
ntohs
select
gethostbyname
htons
send
gethostname
getsockname
socket
setsockopt
WSAIoctl
WSACleanup
WSAStartup
connect
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
Exports
Exports
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ