Shellex
Behavioral task
behavioral1
Sample
77c6c674d7d22415bcd57d4a0942bc18cea24c6494eab852437302fe3fa5b83d.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
77c6c674d7d22415bcd57d4a0942bc18cea24c6494eab852437302fe3fa5b83d.dll
Resource
win10v2004-20250217-en
General
-
Target
77c6c674d7d22415bcd57d4a0942bc18cea24c6494eab852437302fe3fa5b83d
-
Size
1.7MB
-
MD5
90538dcfac6f7189367da359df39c087
-
SHA1
e8a55e36bc6e99af08c8504449f74ed89886e257
-
SHA256
77c6c674d7d22415bcd57d4a0942bc18cea24c6494eab852437302fe3fa5b83d
-
SHA512
d0aa84f9a4dddb541be785f48abbb524cb39ac1ee78c54ee628b05ed1b64e185b430698c45ca87caafd6708ad570c151af3059f75c7406974329c7581fe76339
-
SSDEEP
24576:VZ1g1PnuWz1SJij+12h5UgM518NlECWMtRkOYWLyDtTDhcEx5MZAK0K1:Vo1hyJTDL5E1
Malware Config
Signatures
-
resource yara_rule sample purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Purplefox family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77c6c674d7d22415bcd57d4a0942bc18cea24c6494eab852437302fe3fa5b83d
Files
-
77c6c674d7d22415bcd57d4a0942bc18cea24c6494eab852437302fe3fa5b83d.dll windows:4 windows x86 arch:x86
cdb5780a1d6f41a74770eccc2dd1d3d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
ExitProcess
GetVersion
DeviceIoControl
Beep
GetVersionExA
GetModuleFileNameA
WinExec
TerminateThread
GetTickCount
GetCommandLineA
FreeConsole
GetCurrentProcessId
GetConsoleProcessList
AttachConsole
WideCharToMultiByte
MultiByteToWideChar
GlobalSize
QueryPerformanceFrequency
QueryPerformanceCounter
LoadLibraryW
GlobalMemoryStatusEx
GetSystemInfo
GetSystemDirectoryA
OpenProcess
ReleaseMutex
CreateMutexA
GetCurrentThread
GetEnvironmentVariableA
GetCurrentThreadId
lstrcpyW
Module32Next
lstrcmpiA
Module32First
CreateRemoteThread
GetProcessId
ResumeThread
OpenThread
Thread32Next
Thread32First
SuspendThread
GetPriorityClass
GlobalMemoryStatus
GetComputerNameA
GetPrivateProfileStringA
SystemTimeToTzSpecificLocalTime
lstrcpynA
lstrcmpA
TerminateProcess
Process32First
Process32Next
CreateToolhelp32Snapshot
GetFileAttributesExA
FileTimeToSystemTime
MoveFileA
SetFileAttributesA
GetProcAddress
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrcpyA
CreateDirectoryA
GetLastError
DeleteFileA
GetCurrentProcess
IsWow64Process
SetFilePointer
WriteFile
GetFileAttributesA
CreateFileA
GetFileSize
ReadFile
lstrlenA
FreeLibrary
IsBadReadPtr
VirtualProtect
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
Sleep
CancelIo
SetEvent
ResetEvent
CreateEventA
LocalAlloc
LocalReAlloc
LocalSize
LocalFree
GetModuleHandleA
GetLocalTime
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
CreateThread
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
WaitForSingleObject
CloseHandle
LoadLibraryA
GetWindowsDirectoryA
user32
ShowWindow
wsprintfA
MessageBoxA
CharNextA
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
EnumWindows
ExitWindowsEx
SwapMouseButton
GetWindowRect
MoveWindow
FindWindowA
ChangeDisplaySettingsA
GetSystemMetrics
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDesktopWindow
GetWindowLongA
LoadCursorA
DestroyCursor
BlockInput
ReleaseDC
SystemParametersInfoA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
GetClipboardData
PostMessageA
GetCursorInfo
GetCursorPos
SetThreadDesktop
IsWindowVisible
GetWindowThreadProcessId
WaitForInputIdle
GetLastInputInfo
GetWindow
GetClassNameA
SetRect
SendMessageA
DispatchMessageA
TranslateMessage
PostQuitMessage
SetWindowLongA
LoadIconA
SetClassLongA
DestroyWindow
GetDlgItemTextA
SetFocus
GetWindowTextLengthA
SetWindowTextA
SetDlgItemTextA
CreateDialogIndirectParamA
GetDlgItem
SetWindowPos
GetMessageA
IsDialogMessageA
GetUserObjectInformationA
GetThreadDesktop
CloseDesktop
OpenInputDesktop
GetDC
gdi32
CreateCompatibleBitmap
GetDIBits
CreateRectRgnIndirect
CombineRgn
GetRegionData
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
GetDeviceCaps
advapi32
DuplicateTokenEx
ImpersonateLoggedOnUser
RevertToSelf
GetTokenInformation
LookupAccountSidA
AbortSystemShutdownA
RegOpenKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusA
QueryServiceConfigA
RegCloseKey
RegOpenKeyExA
GetUserNameA
SetFileSecurityA
ConvertStringSecurityDescriptorToSecurityDescriptorA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyA
StartServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegQueryValueExA
RegDeleteValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegCreateKeyExA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
DeleteService
ControlService
QueryServiceStatus
QueryServiceConfig2A
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHGetFileInfoA
ShellExecuteExA
SHGetFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
mfc42
ord5440
ord940
ord6283
ord2784
ord6662
ord2763
ord6282
ord5710
ord536
ord939
ord6876
ord6394
ord5450
ord2044
ord5834
ord535
ord4278
ord6663
ord4277
ord4129
ord2448
ord3663
ord1140
ord926
ord924
ord4202
ord2818
ord6143
ord354
ord5186
ord665
ord4204
ord2915
ord5442
ord5572
ord6874
ord2764
ord1979
ord356
ord858
ord537
ord922
ord2770
ord2781
ord4058
ord3178
ord1980
ord4215
ord3324
ord3310
ord3010
ord3304
ord3181
ord941
ord6883
ord668
ord2614
ord860
ord3811
ord800
ord541
ord540
ord801
ord825
ord823
ord6383
msvcrt
wcstombs
memchr
_snprintf
??1type_info@@UAE@XZ
mbstowcs
_onexit
_initterm
_adjust_fdiv
_errno
atoi
_CxxThrowException
realloc
strncat
atol
strncpy
_splitpath
remove
system
rand
wcsstr
_strlwr
strrchr
_except_handler3
sprintf
free
malloc
strncmp
_stricmp
floor
strchr
tolower
__dllonexit
_wcsupr
_strcmpi
_itoa
_access
_strnicmp
exit
fprintf
sscanf
getenv
vsprintf
_CIpow
wcslen
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_iob
wcscpy
msvcp60
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
winmm
waveInGetNumDevs
mciSendStringA
ws2_32
bind
sendto
inet_addr
gethostname
ntohs
getpeername
recvfrom
__WSAFDIsSet
ioctlsocket
WSAStartup
accept
inet_ntoa
listen
closesocket
getsockname
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
send
recv
select
iphlpapi
GetIfTable
dwmapi
ord102
DwmIsCompositionEnabled
shlwapi
PathGetArgsA
PathRemoveArgsA
PathUnquoteSpacesA
PathFindFileNameA
netapi32
NetUserAdd
NetUserGetLocalGroups
NetApiBufferFree
NetUserGetInfo
NetUserDel
NetUserSetInfo
NetLocalGroupAddMembers
NetUserEnum
psapi
GetProcessMemoryInfo
GetModuleFileNameExA
wininet
InternetGetConnectedState
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
wtsapi32
WTSEnumerateSessionsA
WTSQuerySessionInformationW
WTSDisconnectSession
WTSLogoffSession
WTSQuerySessionInformationA
WTSFreeMemory
Exports
Exports
Sections
.text Size: 612KB - Virtual size: 609KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rotext Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 304KB - Virtual size: 741KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ