ServiceMain
Behavioral task
behavioral1
Sample
a298910d2c2bae112927465dff6749b0.dll
Resource
win7-20240221-en
General
-
Target
a298910d2c2bae112927465dff6749b0
-
Size
525KB
-
MD5
a298910d2c2bae112927465dff6749b0
-
SHA1
767fed961ccbd7eb40fb2d04f355e0441dc569a5
-
SHA256
7ee3f2df710961041e7718cd32ce7e0e3d5cc264268b2a1c5d794dd6e7a26146
-
SHA512
7d512835bf5e3f8046703332d5dc85e14b395b0e2e2c9636abd0f1176446ea1f66a3d2cf495fef1b60ca1777d3da91e87ff5d6ea1915f104681dc1ca7b221be9
-
SSDEEP
3072:XaaIIf5xahjfNfpDhBis1MWVUvwLZdrH9v:qWHahJJhA+bUvw1dx
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a298910d2c2bae112927465dff6749b0
Files
-
a298910d2c2bae112927465dff6749b0.dll windows:4 windows x86 arch:x86
61e86d955d9c20723adccf240cb0576b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
HeapFree
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
FindNextFileA
WaitForMultipleObjects
LocalSize
OpenProcess
GetCurrentProcess
GetCurrentThreadId
GlobalMemoryStatus
GetSystemInfo
OpenEventA
SetErrorMode
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
ExitProcess
GetSystemDirectoryA
MoveFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
lstrcpyA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
LoadLibraryA
GetProcAddress
FreeLibrary
GetLocalTime
GetTickCount
Sleep
CancelIo
InterlockedExchange
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
PeekNamedPipe
CreateEventA
user32
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
wsprintfA
GetCursorPos
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
SendMessageA
OpenInputDesktop
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
IsWindow
CloseWindow
CreateWindowExA
GetUserObjectInformationA
DispatchMessageA
GetThreadDesktop
OpenDesktopA
SetThreadDesktop
PostMessageA
EnumWindows
GetWindowTextA
keybd_event
TranslateMessage
GetMessageA
CharNextA
gdi32
DeleteDC
GetDIBits
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
DeleteObject
BitBlt
advapi32
LsaClose
IsValidSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegQueryValueA
CloseEventLog
ClearEventLogA
OpenEventLogA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
LookupAccountSidA
GetTokenInformation
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
StartServiceA
RegSaveKeyA
RegRestoreKeyA
LookupAccountNameA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
winmm
waveOutClose
waveOutUnprepareHeader
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveInReset
waveInUnprepareHeader
waveInClose
waveOutReset
msvcrt
_strcmpi
_stricmp
_except_handler3
_strnicmp
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
srand
_access
wcstombs
atoi
_beginthreadex
strncat
puts
strrchr
_strrev
free
malloc
strchr
strncpy
sprintf
rand
_CxxThrowException
strstr
_ftol
ceil
putchar
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
ws2_32
getsockname
gethostname
htonl
WSAStartup
WSACleanup
WSAIoctl
WSASocketA
sendto
inet_addr
send
closesocket
recv
select
gethostbyname
htons
connect
setsockopt
socket
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
msvcp60
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
imm32
ImmGetCompositionStringA
ImmReleaseContext
ImmGetContext
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
Exports
Exports
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ