Extended Key Usages
ExtKeyUsageCodeSigning
Overview
overview
7Static
static
1Gulagger.rar
windows7-x64
3Gulagger.rar
windows10-2004-x64
7CONTRIBUTING.md
windows7-x64
3CONTRIBUTING.md
windows10-2004-x64
3Kill Active.bat
windows7-x64
1Kill Active.bat
windows10-2004-x64
1Kill Gulagger.bat
windows7-x64
1Kill Gulagger.bat
windows10-2004-x64
1LEGAL.md
windows7-x64
3LEGAL.md
windows10-2004-x64
3LICENSE
windows7-x64
1LICENSE
windows10-2004-x64
1README.md
windows7-x64
3README.md
windows10-2004-x64
3UploadThes...g.json
windows7-x64
3UploadThes...g.json
windows10-2004-x64
3UploadThese/ct0.txt
windows7-x64
1UploadThese/ct0.txt
windows10-2004-x64
1UploadThes...ion.js
windows7-x64
1UploadThes...ion.js
windows10-2004-x64
1UploadThes...d.json
windows7-x64
3UploadThes...d.json
windows10-2004-x64
3build.bat
windows7-x64
1build.bat
windows10-2004-x64
1build.js
windows7-x64
1build.js
windows10-2004-x64
1config.js
windows7-x64
1config.js
windows10-2004-x64
1default.ico
windows7-x64
3default.ico
windows10-2004-x64
3fix.bat
windows7-x64
1fix.bat
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Gulagger.rar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Gulagger.rar
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
CONTRIBUTING.md
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
CONTRIBUTING.md
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Kill Active.bat
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Kill Active.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Kill Gulagger.bat
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Kill Gulagger.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
LEGAL.md
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
LEGAL.md
Resource
win10v2004-20240220-en
Behavioral task
behavioral11
Sample
LICENSE
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
LICENSE
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
README.md
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
README.md
Resource
win10v2004-20240220-en
Behavioral task
behavioral15
Sample
UploadThese/config.json
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
UploadThese/config.json
Resource
win10v2004-20240220-en
Behavioral task
behavioral17
Sample
UploadThese/ct0.txt
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
UploadThese/ct0.txt
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
UploadThese/discord_injection.js
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
UploadThese/discord_injection.js
Resource
win10v2004-20240220-en
Behavioral task
behavioral21
Sample
UploadThese/embed.json
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
UploadThese/embed.json
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
build.bat
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
build.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
build.js
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
build.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
config.js
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
config.js
Resource
win10v2004-20240220-en
Behavioral task
behavioral29
Sample
default.ico
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
default.ico
Resource
win10v2004-20240220-en
Behavioral task
behavioral31
Sample
fix.bat
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
fix.bat
Resource
win10v2004-20231215-en
Target
Gulagger.rar
Size
2.8MB
MD5
9b957972403be1ca4992e39204f01488
SHA1
e4e75ae0172be1ec47546e007b53cfbcf03cbb94
SHA256
57357568656b7b091b78b023c3e0702a62a61e373e7ace935ee03add63abd1f8
SHA512
62298002b8508f2e9fd1cc5a8c7cb3c555d812dec42d9fa933fb67eecf9895bac58ccf790d114adcb26d8dc008b2cfbf7928e8b51907f77fef063b51e5d6c7f0
SSDEEP
49152:JuU2EylNpSZ8fj5whhOmV64wYLy36Ot1kPOE1JWfgtnWwEFHeLsIhMb+:nylNQZgWyZ2m6OtCP9EgtnOdeLsIWb+
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
upgraderstub.pdb
EnableTraceEx2
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
QueryTraceW
EventUnregister
ControlTraceW
RegOpenKeyExW
RegSetValueExW
RegSetKeySecurity
EventSetInformation
RegCreateKeyExW
RegDeleteKeyW
EventRegister
EventWriteTransfer
RegCloseKey
StartTraceW
GetSecurityDescriptorDacl
AdjustTokenPrivileges
OpenProcessToken
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorSacl
GetSecurityDescriptorControl
GetSecurityDescriptorLength
GetAclInformation
RevertToSelf
OpenEncryptedFileRawW
WriteEncryptedFileRaw
CloseEncryptedFileRaw
GetVolumePathNamesForVolumeNameW
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
WaitForMultipleObjectsEx
GlobalMemoryStatusEx
GetVolumeInformationByHandleW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
CreateSemaphoreW
WaitForMultipleObjects
GetPrivateProfileSectionW
UnlockFileEx
LockFileEx
InitializeCriticalSectionAndSpinCount
CreateEventW
GetVolumeInformationW
GetCurrentThread
SetThreadIdealProcessor
GetSystemInfo
GetOverlappedResult
GetHandleInformation
DeleteCriticalSection
LocalFree
CreateThread
GlobalFree
DeleteFileW
InitOnceComplete
GetExitCodeThread
GetFileAttributesW
LocalAlloc
CreateMutexW
GetTempPathW
InitializeCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetFullPathNameW
GetCommandLineW
EnterCriticalSection
SetDefaultDllDirectories
CompareStringW
WritePrivateProfileStringW
InitOnceBeginInitialize
CreateDirectoryW
IsDebuggerPresent
DebugBreak
GetModuleHandleW
GetProcessHeap
GetCurrentProcessId
CreateMutexExW
GetProcAddress
HeapAlloc
CloseHandle
OpenSemaphoreW
WaitForSingleObjectEx
OutputDebugStringW
GetLastError
FormatMessageW
ReleaseMutex
GetCurrentThreadId
WaitForSingleObject
GetModuleHandleExW
ReleaseSemaphore
SetLastError
HeapFree
CreateSemaphoreExW
GetModuleFileNameA
Sleep
GetStartupInfoW
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
GetFileInformationByHandleEx
FindFirstFileW
FindNextFileW
DeviceIoControl
FindClose
CreateFileW
SetFileAttributesW
GetFileInformationByHandle
SetFileInformationByHandle
CopyFileExW
FlushFileBuffers
GetFileSizeEx
GetCurrentDirectoryW
FreeLibrary
LoadLibraryExW
GetLongPathNameW
GetFinalPathNameByHandleW
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
GetDriveTypeW
GetEnvironmentVariableW
SetEvent
ResetEvent
WideCharToMultiByte
MultiByteToWideChar
RemoveDirectoryW
CreateFileA
GlobalAlloc
SetFilePointerEx
ReadFile
WriteFile
SetFilePointer
HeapReAlloc
HeapSize
GetShortPathNameW
SetEndOfFile
DuplicateHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
OpenProcess
OpenMutexW
LoadLibraryW
GetTempFileNameW
MoveFileW
VerifyVersionInfoW
UnhandledExceptionFilter
VerSetConditionMask
LoadStringW
CharUpperW
MessageBoxW
memcmp
strcpy_s
memcpy
memmove
_wcsicmp
wcsrchr
_wcsnicmp
iswspace
towupper
_vscwprintf
qsort
_except_handler4_common
_controlfp
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_onexit
__dllonexit
_unlock
_lock
_acmdln
_initterm
__setusermatherr
_ismbblead
__p__fmode
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
__p__commode
_XcptFilter
_CxxThrowException
sprintf_s
memmove_s
wcschr
??0exception@@QAE@ABQBD@Z
?what@exception@@UBEPBDXZ
_purecall
iswdigit
wcsnlen
_vsnprintf_s
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
memcpy_s
_vsnwprintf
__CxxFrameHandler3
swscanf_s
wcsncmp
wcsstr
memset
CoInitialize
CoTaskMemFree
CoUninitialize
RpcStringFreeW
UuidCreate
UuidToStringW
CommandLineToArgvW
ShellExecuteExW
SHGetSpecialFolderPathW
PathRemoveFileSpecW
StrStrIW
PathFindFileNameW
ord22
ord20
ord23
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
NtYieldExecution
NtQueryInformationFile
RtlAdjustPrivilege
RtlGetLastNtStatus
RtlSetControlSecurityDescriptor
RtlFindAceByType
NtSetSecurityObject
NtQueryVolumeInformationFile
NtQueryInformationProcess
RtlDosPathNameToNtPathName_U
NtCreateFile
NtClose
RtlInitializeResource
RtlAcquireResourceExclusive
RtlAcquireResourceShared
RtlReleaseResource
RtlDeleteResource
RtlImpersonateSelf
NtSetEaFile
DbgPrintEx
RtlFreeHeap
RtlAllocateHeap
RtlNtStatusToDosError
NtSetInformationFile
RtlReAllocateHeap
RtlRaiseStatus
GetModuleFileNameExW
EnumProcesses
BCryptCreateHash
BCryptCloseAlgorithmProvider
BCryptDestroyHash
BCryptFinishHash
BCryptOpenAlgorithmProvider
BCryptHashData
BCryptGetProperty
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ