Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 01:31
General
-
Target
0a9116f7dfd2e49df99d5e7e3639cf694af087c25706d7d99c3be8999e210301.dll
-
Size
899KB
-
MD5
05a16db0a97b35e2c232164380415672
-
SHA1
1442c3b159c3b70ab454e237ca1f73ecd5e79297
-
SHA256
0a9116f7dfd2e49df99d5e7e3639cf694af087c25706d7d99c3be8999e210301
-
SHA512
55a24b000a76f43bb9da64d78ed8529bc95894167db21284ff5475d5414278f4ece27381c1195f8172a7eb4e9979fa83a5991856362c5ecde932b9480b1163a3
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXB:7wqd87VB
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/4572-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4572 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4572 5088 rundll32.exe 86 PID 5088 wrote to memory of 4572 5088 rundll32.exe 86 PID 5088 wrote to memory of 4572 5088 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a9116f7dfd2e49df99d5e7e3639cf694af087c25706d7d99c3be8999e210301.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a9116f7dfd2e49df99d5e7e3639cf694af087c25706d7d99c3be8999e210301.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4572
-