Behavioral task
behavioral1
Sample
bef80164dec9656dbaaacfffea0d9450.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bef80164dec9656dbaaacfffea0d9450.dll
Resource
win10v2004-20240226-en
General
-
Target
bef80164dec9656dbaaacfffea0d9450
-
Size
75KB
-
MD5
bef80164dec9656dbaaacfffea0d9450
-
SHA1
47ab101262aa773bbfe3e69aee1a3c20ec92f951
-
SHA256
ca6ece30a6ebcd1faaea0d7d5c466b6a18dc33564bd7d3dad7c5274c4f9970cd
-
SHA512
4186d8cf90e6b9b726e9019d04a94ef8d1e175de7c00be2d52bef847f3a3ab4b41d12dd1d57e9d0239b9fffe2c07f4baa8b969daa9a6c8a93c12f4b3f75db4d7
-
SSDEEP
1536:dFDMbbMt9ODnjfiwKcuybfLIeEwKJB4AY4eEt2reOv3/DRI:dFIMDODn+wKByrLIeNKJBZ2EtueOv3/1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bef80164dec9656dbaaacfffea0d9450
Files
-
bef80164dec9656dbaaacfffea0d9450.dll windows:4 windows x86 arch:x86
34be880a9d6a1790ccc81f71a32d59c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
FreeLibrary
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
WritePrivateProfileStringA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
CancelIo
LoadLibraryA
GetPrivateProfileStringA
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
CreateThread
DisableThreadLibraryCalls
SetThreadPriority
InterlockedExchange
SetEvent
InitializeCriticalSection
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetProcAddress
user32
MessageBoxA
wsprintfA
ExitWindowsEx
advapi32
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
ShellExecuteA
msvcrt
_initterm
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
sprintf
exit
strtok
printf
_beginthreadex
atoi
rand
strchr
srand
strncpy
strcspn
free
malloc
calloc
??1type_info@@UAE@XZ
_adjust_fdiv
ws2_32
socket
ntohs
recv
closesocket
select
send
inet_addr
gethostbyname
sendto
WSASocketA
htonl
gethostname
WSACleanup
WSAStartup
htons
connect
setsockopt
inet_ntoa
WSAIoctl
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ