Behavioral task
behavioral1
Sample
047e391e56faed336bd3ebcf8b136e6278d747ec3311a4d1ad52f82520e2d202.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
047e391e56faed336bd3ebcf8b136e6278d747ec3311a4d1ad52f82520e2d202.dll
Resource
win10v2004-20240226-en
General
-
Target
047e391e56faed336bd3ebcf8b136e6278d747ec3311a4d1ad52f82520e2d202
-
Size
75KB
-
MD5
ff0078d131d86b549fa27b6099c48bda
-
SHA1
389dd4e1851b243fa87636bc241f06f4331e64a1
-
SHA256
047e391e56faed336bd3ebcf8b136e6278d747ec3311a4d1ad52f82520e2d202
-
SHA512
1406dd6063e5003efc08e69b3cbdc4936b3a83f69b9d1cc36ed2f7f6bc4fc8d361ac8dddb0269c34b264566e93a2b482453169ccd51aad12988a3b35e41d2721
-
SSDEEP
1536:dFDMbbMt9ODnjfiwKcuybfLIeEwKJB4AY4eEtTreOv3/DRI:dFIMDODn+wKByrLIeNKJBZ2EtPeOv3/1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 047e391e56faed336bd3ebcf8b136e6278d747ec3311a4d1ad52f82520e2d202
Files
-
047e391e56faed336bd3ebcf8b136e6278d747ec3311a4d1ad52f82520e2d202.dll windows:4 windows x86 arch:x86
34be880a9d6a1790ccc81f71a32d59c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Sleep
FreeLibrary
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
WritePrivateProfileStringA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
CancelIo
LoadLibraryA
GetPrivateProfileStringA
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
CreateThread
DisableThreadLibraryCalls
SetThreadPriority
InterlockedExchange
SetEvent
InitializeCriticalSection
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetProcAddress
user32
MessageBoxA
wsprintfA
ExitWindowsEx
advapi32
RegQueryValueExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
ShellExecuteA
msvcrt
_initterm
??3@YAXPAX@Z
memmove
ceil
_ftol
strstr
__CxxFrameHandler
??2@YAPAXI@Z
_CxxThrowException
sprintf
exit
strtok
printf
_beginthreadex
atoi
rand
strchr
srand
strncpy
strcspn
free
malloc
calloc
??1type_info@@UAE@XZ
_adjust_fdiv
ws2_32
socket
ntohs
recv
closesocket
select
send
inet_addr
gethostbyname
sendto
WSASocketA
htonl
gethostname
WSACleanup
WSAStartup
htons
connect
setsockopt
inet_ntoa
WSAIoctl
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ