AsingleDLL
DllFuUpgradrs
DllFuUpgradrs1
Target
mother.exe
Size
1.1MB
MD5
74902e2aa8f543d08dd3ce6b160394c4
SHA1
ed261f760494c58b6ec8ae75986042072a0bb1c0
SHA256
0a21c4c0d6284b6bb9f8969745e2bd4287cb92f7c3464784793679dc554026ab
SHA512
4083ef42fc5266c739a2ae889dde892d8db90a3be3be4ad053e825e18bd6969ae6a43e9f8f5cebe4b6a5fdb275076ccb762034b722eaa64e741f958c52b4c8d9
SSDEEP
24576:wFipiBU7qaWf36jWaidO3haWqeBJM514ZBAOyMtRcaISFbi:8i6fKjjlW
resource | yara_rule |
---|---|
sample | family_gh0strat |
Checks for missing Authenticode signature.
resource |
---|
mother.exe |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcmpA
lstrcpynA
SystemTimeToTzSpecificLocalTime
GetPrivateProfileStringA
GetComputerNameA
GlobalMemoryStatus
GetPriorityClass
SuspendThread
Thread32First
Thread32Next
OpenThread
ResumeThread
GetProcessId
CreateRemoteThread
Module32First
lstrcmpiA
Module32Next
lstrcpyW
GetCurrentThreadId
ExpandEnvironmentStringsA
DuplicateHandle
CreateMutexA
OutputDebugStringA
GetEnvironmentVariableA
GetCurrentThread
GetModuleFileNameW
GetSystemDirectoryW
GetSystemInfo
GlobalMemoryStatusEx
LoadLibraryW
QueryPerformanceCounter
QueryPerformanceFrequency
GlobalSize
MultiByteToWideChar
WideCharToMultiByte
GetWindowsDirectoryA
AttachConsole
GetConsoleProcessList
GetCurrentProcessId
FreeConsole
GetCommandLineA
GetTickCount
TerminateThread
GetProcAddress
WinExec
OpenProcess
TerminateProcess
GetVersionExA
GetModuleFileNameA
CopyFileA
MoveFileExA
Beep
DeviceIoControl
GetVersion
ExitProcess
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetStdHandle
IsBadCodePtr
GetStringTypeW
Process32First
Process32Next
CreateToolhelp32Snapshot
GetFileAttributesExA
FileTimeToSystemTime
MoveFileA
SetFileAttributesA
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrcpyA
CreateDirectoryA
GetLastError
DeleteFileA
GetCurrentProcess
IsWow64Process
SetFilePointer
WriteFile
LocalSize
GetSystemDirectoryA
GetFileAttributesA
CreateFileA
GetFileSize
ReadFile
lstrlenA
LocalReAlloc
LocalAlloc
LocalFree
FreeLibrary
IsBadReadPtr
VirtualProtect
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
Sleep
CancelIo
SetEvent
ResetEvent
CreateEventA
GetModuleHandleA
GetLocalTime
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
CreateThread
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
WaitForSingleObject
CloseHandle
InterlockedDecrement
FileTimeToLocalFileTime
SetLastError
FlushFileBuffers
LockFile
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
UnlockFile
SetEndOfFile
LoadLibraryA
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
IsBadWritePtr
HeapCreate
HeapDestroy
HeapSize
GetACP
GetSystemTime
GetTimeZoneInformation
GetFullPathNameA
GetStartupInfoA
RaiseException
RtlUnwind
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GlobalFlags
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
TlsGetValue
TlsSetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
GetFileTime
InterlockedIncrement
ShowWindow
wsprintfA
MessageBoxA
GetWindowLongA
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
PostQuitMessage
DispatchMessageA
SendMessageA
SetWindowLongA
LoadIconA
SetClassLongA
DestroyWindow
CharNextA
GetMenuItemCount
TranslateMessage
IsDialogMessageA
GetMessageA
EnumWindows
ExitWindowsEx
SwapMouseButton
GetWindowRect
MoveWindow
FindWindowA
ChangeDisplaySettingsA
GetSystemMetrics
GetDC
LoadCursorA
DestroyCursor
BlockInput
ReleaseDC
SystemParametersInfoA
keybd_event
MapVirtualKeyA
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
PostMessageA
SetCapture
WindowFromPoint
SetWindowPos
GetDlgItem
SetCursorPos
GetCursorInfo
GetCursorPos
CreateDialogIndirectParamA
SetDlgItemTextA
SetWindowTextA
GetWindowTextLengthA
SetFocus
OpenInputDesktop
CloseDesktop
GetThreadDesktop
GetUserObjectInformationA
SetThreadDesktop
IsWindowVisible
GetWindowThreadProcessId
WaitForInputIdle
RegisterClassA
PostThreadMessageA
GetInputState
RegisterClassExA
CharUpperA
LoadStringA
UnhookWindowsHookEx
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
PeekMessageA
CallNextHookEx
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowPlacement
IsIconic
RegisterWindowMessageA
SetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
GetDlgCtrlID
GetMenuItemID
GetSubMenu
SetRect
GetMenu
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
GetSysColorBrush
PtInRect
ClientToScreen
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
CreateWindowExA
DefWindowProcA
GetLastInputInfo
GetWindow
GetClassNameA
GetDesktopWindow
GetDlgItemTextA
CreateCompatibleBitmap
GetDIBits
CreateRectRgnIndirect
CombineRgn
GetRegionData
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
GetDeviceCaps
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetObjectA
SaveDC
RestoreDC
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
PtVisible
RectVisible
Escape
ExtTextOutA
TextOutA
RegQueryValueExA
GetTokenInformation
LookupAccountSidA
AbortSystemShutdownA
RegOpenKeyA
StartServiceCtrlDispatcherA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusA
QueryServiceConfigA
QueryServiceConfig2A
QueryServiceStatus
ControlService
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
RegCreateKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegEnumKeyExA
RegEnumValueA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DeleteService
SetServiceStatus
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceA
RegCreateKeyA
RegSetValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
GetUserNameA
RegOpenKeyExA
ShellExecuteExA
SHGetFolderPathA
SHGetFileInfoA
SHGetSpecialFolderPathA
CoCreateGuid
CoInitialize
CoCreateInstance
CoUninitialize
SysFreeString
ord17
mciSendStringA
waveInGetNumDevs
GetIfTable
inet_addr
getsockname
bind
gethostname
accept
listen
sendto
recvfrom
__WSAFDIsSet
ioctlsocket
ntohs
inet_ntoa
closesocket
select
recv
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
getpeername
send
ord102
DwmIsCompositionEnabled
PathFindFileNameA
PathUnquoteSpacesA
PathRemoveArgsA
PathGetArgsA
SHDeleteKeyA
NetUserSetInfo
NetUserGetLocalGroups
NetApiBufferFree
NetUserAdd
NetLocalGroupAddMembers
NetUserEnum
NetUserGetInfo
NetUserDel
GetModuleFileNameExA
GetProcessMemoryInfo
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetCloseHandle
InternetConnectA
InternetOpenA
DeleteUrlCacheEntry
InternetGetConnectedState
InternetReadFile
WTSFreeMemory
WTSLogoffSession
WTSEnumerateSessionsA
WTSQuerySessionInformationW
WTSDisconnectSession
WTSQuerySessionInformationA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
AsingleDLL
DllFuUpgradrs
DllFuUpgradrs1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ