Behavioral task
behavioral1
Sample
72d49cfdff137a4cd8f64cd6cf13749a.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72d49cfdff137a4cd8f64cd6cf13749a.dll
Resource
win10v2004-20231222-en
General
-
Target
72d49cfdff137a4cd8f64cd6cf13749a
-
Size
66KB
-
MD5
72d49cfdff137a4cd8f64cd6cf13749a
-
SHA1
021845b827d51ed019d00d31d80426b19174adc0
-
SHA256
3eb9a14fe37698833c421a80660faa62783125b5fe51b5fea6346141f789fbaa
-
SHA512
9df9b2a3b3f004e52bcd8ff0e7b7c3bae9940e48e83f43dee2385c36368829f7663044bb31573d2d3a9528dfaf26db8b5c2d49ec51c5bf41e94c0a6f2229afd2
-
SSDEEP
1536:Cyw/AOt17NTXLPtY+EGkym0CcWA6fcW8pqIu5:vw/AOLNtYZG9m0CdA8cW8AIu5
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 72d49cfdff137a4cd8f64cd6cf13749a
Files
-
72d49cfdff137a4cd8f64cd6cf13749a.dll windows:4 windows x86 arch:x86
70de6a7e5bb3d560347a4c6ad950d2d1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MoveFileA
GetTempPathA
GetModuleFileNameA
SetLastError
GetCurrentProcess
VirtualAllocEx
OpenProcess
TerminateThread
GetWindowsDirectoryA
GetLocalTime
WriteFile
GetTickCount
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
ReadFile
SetFilePointer
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetDriveTypeA
lstrcatA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
SetEvent
WaitForSingleObject
lstrcpyA
ResetEvent
FreeLibrary
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
GetProcAddress
GetVersionExA
user32
wsprintfA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
CharNextA
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyA
RegQueryValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
shell32
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
_CxxThrowException
??2@YAPAXI@Z
free
malloc
_except_handler3
strrchr
strncpy
strtok
strncat
strchr
realloc
atoi
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
ws2_32
select
ntohs
closesocket
socket
gethostbyname
recv
send
gethostname
getsockname
htons
connect
WSAStartup
WSAIoctl
?_Tidy@?$basic_string@DU?$char_traits@D@std@
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ