StudyHard
Behavioral task
behavioral1
Sample
832-1-0x0000000010000000-0x0000000010015000-memory.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
832-1-0x0000000010000000-0x0000000010015000-memory.dll
Resource
win10v2004-20231215-en
General
-
Target
832-1-0x0000000010000000-0x0000000010015000-memory.dmp
-
Size
84KB
-
MD5
f2d508f960fdc5e2f18732b8868b9994
-
SHA1
5d90e9114b621988dd73dfcbb060a1733a5969be
-
SHA256
aabd44487d2ed15c5cd2a2aa376b57cef73a740bbd994bd87bb12d66bee5b282
-
SHA512
7b6100556b22896722e4543e8f9f089eebfac5400735fc37b10c2536ddc2d9565869f17489a0fb67cab1358fd7c53dee2b1f4a3fdd8ad06619d687d059b4a8fe
-
SSDEEP
1536:iTsenhY8kwtuwL7hSm1RhDIOdnToIfAUfelGHE:SsEY8mwnhSyVTBfAUfnHE
Malware Config
Extracted
gh0strat
www.996m2m2.top
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 832-1-0x0000000010000000-0x0000000010015000-memory.dmp
Files
-
832-1-0x0000000010000000-0x0000000010015000-memory.dmp.dll windows:4 windows x86 arch:x86
2221c0107b5e2205969c1e2018e65d34
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
lstrcatA
CopyFileA
GetModuleFileNameA
CreateProcessA
ExpandEnvironmentStringsA
lstrcpyA
FreeLibrary
GetProcAddress
LoadLibraryA
TerminateThread
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
DeleteFileA
GetTickCount
LocalAlloc
ReadFile
HeapAlloc
GetProcessHeap
VirtualProtect
HeapFree
GetSystemInfo
lstrcmpiA
GetLocalTime
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetVersionExA
WinExec
GetFileAttributesA
CreateDirectoryA
ReleaseMutex
CreateMutexA
MoveFileExA
MoveFileA
SetFileAttributesA
Process32Next
Process32First
OutputDebugStringA
CreateThread
ExitProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemDirectoryA
GetFileSize
SetFilePointer
lstrlenA
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
GlobalAlloc
GetLastError
LocalFree
SetLastError
CreateFileA
DeviceIoControl
WriteFile
CloseHandle
Sleep
GetVersion
GetCurrentProcess
FindFirstFileA
VirtualFree
FindNextFileA
GlobalLock
GlobalUnlock
VirtualAlloc
LoadLibraryW
user32
GetMessageA
EnumWindows
IsWindowVisible
SendMessageA
MessageBoxA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
PostThreadMessageA
GetInputState
GetLastInputInfo
SetClipboardData
CloseClipboard
GetClipboardData
OpenClipboard
ExitWindowsEx
EmptyClipboard
wsprintfA
GetWindowTextA
advapi32
OpenProcessToken
CloseEventLog
RegOpenKeyExA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
DeleteService
OpenServiceA
OpenSCManagerA
RegQueryValueExA
RegOpenKeyA
RegQueryValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
ClearEventLogA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
SHChangeNotify
ole32
CoInitialize
CoUninitialize
CoCreateGuid
ws2_32
socket
getsockname
gethostname
send
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
select
recv
closesocket
msvcrt
_strcmpi
_CxxThrowException
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_beginthreadex
_except_handler3
strncmp
sprintf
_stricmp
_snprintf
printf
strcspn
strncpy
atoi
_access
strrchr
malloc
free
realloc
rand
strstr
_strupr
??2@YAPAXI@Z
exit
__CxxFrameHandler
_ftol
??3@YAXPAX@Z
setupapi
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyA
SetupDiSetClassInstallParamsA
iphlpapi
GetIfTable
urlmon
URLDownloadToFileA
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 256.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 256.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 256.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 256.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ