Shellex
Behavioral task
behavioral1
Sample
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879.dll
Resource
win10v2004-20240802-en
General
-
Target
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879
-
Size
1.2MB
-
MD5
c3d857ce631028020ef3503dcdfdbd46
-
SHA1
d6adb4d164924eceeced000bca71ab1d1aaa8886
-
SHA256
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879
-
SHA512
d89a5da64f9926cae70b10859024979a17c9aa1b4d47095d526384c1c0e084356bdc06ad44cf44e63f2a725b29dda4ba52b2134d7478203981f68b5fc9c37e5f
-
SSDEEP
24576:JPMVj2SBKlmiknmi+EjuAKGpZlAM5WbUg/n3MtRAaoSFOtTIqwK0b6dc:FQD7ATIoc
Malware Config
Signatures
-
resource yara_rule sample purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Purplefox family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879
Files
-
50a55e1c4cbf144aab02ccc62b1edd118d8189e878fa8c7e0042584093483879.dll windows:4 windows x86 arch:x86
31303f642e59697feb34c1fddb6c3bcf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
Process32First
GetWindowsDirectoryA
CopyFileA
lstrcmpA
OpenProcess
TerminateProcess
OutputDebugStringA
GlobalSize
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersionExA
WinExec
ExitProcess
GetVersion
DeviceIoControl
Beep
MoveFileExA
GetModuleFileNameA
TerminateThread
GetTickCount
GetCommandLineA
FreeConsole
GetCurrentProcessId
GetConsoleProcessList
AttachConsole
SetLastError
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryW
GlobalMemoryStatusEx
GetSystemInfo
Process32Next
GetModuleFileNameW
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCurrentThread
GetEnvironmentVariableA
CreateMutexA
GetCurrentThreadId
CreatePipe
InterlockedDecrement
InterlockedCompareExchange
lstrcpyW
Module32Next
lstrcmpiA
Module32First
CreateRemoteThread
GetProcessId
ResumeThread
OpenThread
Thread32Next
Thread32First
SuspendThread
GetPriorityClass
GlobalMemoryStatus
GetComputerNameA
SystemTimeToTzSpecificLocalTime
lstrcpynA
GetFullPathNameW
CreateFileW
GetModuleHandleW
CreateToolhelp32Snapshot
GetFileAttributesExA
FileTimeToSystemTime
MoveFileA
SetFileAttributesA
RemoveDirectoryA
GetProcAddress
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrcpyA
CreateDirectoryA
GetLastError
DeleteFileA
GetCurrentProcess
IsWow64Process
SetFilePointer
WriteFile
LocalSize
GetSystemDirectoryA
CreateFileA
GetFileSize
ReadFile
lstrlenA
LocalReAlloc
LocalAlloc
LocalFree
FreeLibrary
IsBadReadPtr
VirtualProtect
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
CancelIo
SetEvent
ResetEvent
CreateEventA
Sleep
GetFileAttributesA
GetModuleHandleA
GetLocalTime
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
CreateThread
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
WaitForSingleObject
CloseHandle
LoadLibraryA
GetSystemDirectoryW
user32
GetSystemMetrics
GetDC
LoadCursorA
DestroyCursor
ReleaseDC
CloseDesktop
FindWindowA
BlockInput
SetThreadDesktop
CreateDesktopA
OpenDesktopA
SystemParametersInfoA
ChildWindowFromPoint
ScreenToClient
MoveWindow
GetMenuItemID
MenuItemFromPoint
RealGetWindowClassA
PtInRect
GetWindowRect
GetWindowPlacement
PostMessageA
ChangeDisplaySettingsA
GetWindow
GetTopWindow
IsWindowVisible
PrintWindow
GetCursorInfo
GetCursorPos
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
EnumWindows
ExitWindowsEx
SwapMouseButton
ShowWindow
keybd_event
MapVirtualKeyA
mouse_event
OpenInputDesktop
GetThreadDesktop
GetUserObjectInformationA
GetWindowThreadProcessId
WaitForInputIdle
DefWindowProcA
CreateWindowExA
RegisterClassExA
SetCapture
CharLowerBuffA
IsIconic
CharNextA
MessageBoxA
wsprintfA
EmptyClipboard
SetClipboardData
OpenClipboard
SendMessageA
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetClipboardData
CloseClipboard
GetWindowLongA
PostQuitMessage
SetWindowLongA
LoadIconA
SetClassLongA
DestroyWindow
GetDlgItemTextA
SetFocus
GetWindowTextLengthA
SetWindowTextA
SetDlgItemTextA
CreateDialogIndirectParamA
GetDlgItem
SetWindowPos
GetMessageA
GetLastInputInfo
GetClassNameA
GetDesktopWindow
SetRect
SetCursorPos
WindowFromPoint
gdi32
GetObjectA
GetDIBits
CreateRectRgnIndirect
CombineRgn
GetRegionData
CreateCompatibleBitmap
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
GetDeviceCaps
advapi32
RegFlushKey
GetTokenInformation
LookupAccountSidA
AbortSystemShutdownA
RegOpenKeyA
CheckTokenMembership
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusA
QueryServiceConfigA
QueryServiceConfig2A
QueryServiceStatus
ControlService
RegCloseKey
RegQueryValueA
RegOpenKeyExA
GetUserNameA
RegSetValueExA
RegQueryValueExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyA
StartServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
SetServiceStatus
DeleteService
FreeSid
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegCreateKeyExA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
SHGetFolderPathA
ShellExecuteExA
SHAppBarMessage
SHFileOperationA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
SysFreeString
VariantInit
SysAllocString
mfc42
ord6394
ord5450
ord6383
ord5440
ord940
ord6283
ord2784
ord4129
ord6662
ord4278
ord2763
ord6282
ord5710
ord535
ord536
ord939
ord6876
ord3663
ord926
ord924
ord4202
ord2818
ord6143
ord354
ord5186
ord665
ord4204
ord2915
ord5442
ord5572
ord6874
ord2764
ord1979
ord356
ord858
ord537
ord922
ord2770
ord2781
ord4058
ord3178
ord1980
ord4215
ord3324
ord3310
ord3010
ord3304
ord3181
ord941
ord6883
ord668
ord2614
ord860
ord3811
ord800
ord541
ord540
ord801
ord825
ord823
ord2919
msvcrt
strstr
_ftol
ceil
memmove
_snprintf
wcscat
memchr
_access
_vsnprintf
_mkdir
strftime
localtime
time
wcslen
isdigit
isspace
fprintf
exit
_errno
mbstowcs
wcstombs
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
wcscpy
sprintf
printf
_iob
fopen
remove
atoi
free
malloc
strncmp
_CIpow
fgets
strchr
tolower
_CxxThrowException
_stricmp
_except_handler3
strrchr
_strlwr
wcsstr
rand
system
swprintf
_splitpath
strncpy
atol
strncat
isalnum
realloc
_wcsupr
_strcmpi
_itoa
_strnicmp
sscanf
getenv
vsprintf
floor
fclose
__CxxFrameHandler
msvcp60
??1_Lockit@std@@QAE@XZ
?_Xlen@std@@YAXXZ
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@K@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0_Lockit@std@@QAE@XZ
winmm
mciSendStringA
waveInGetNumDevs
ws2_32
WSAStartup
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
inet_addr
gethostname
ntohs
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
select
inet_ntoa
send
closesocket
recv
WSACleanup
iphlpapi
GetIfTable
shlwapi
StrStrA
PathFindFileNameA
SHDeleteKeyA
PathUnquoteSpacesA
PathRemoveArgsA
PathGetArgsA
PathFileExistsA
urlmon
URLDownloadToFileA
wininet
HttpSendRequestA
InternetOpenUrlA
InternetGetConnectedState
InternetOpenA
InternetConnectA
InternetReadFile
HttpQueryInfoA
HttpOpenRequestA
InternetCloseHandle
netapi32
NetUserGetLocalGroups
NetApiBufferFree
NetUserGetInfo
NetUserEnum
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
NetUserSetInfo
psapi
GetProcessMemoryInfo
GetModuleFileNameExA
wtsapi32
WTSQuerySessionInformationW
WTSDisconnectSession
WTSLogoffSession
WTSQuerySessionInformationA
WTSFreeMemory
WTSEnumerateSessionsA
Exports
Exports
Sections
.text Size: 628KB - Virtual size: 625KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rotext Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 200KB - Virtual size: 639KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ