Behavioral task
behavioral1
Sample
bd0920a53cf610d11b2e83fcbda97e6ad008e1d9bfb9d749d9ea8190502aef16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd0920a53cf610d11b2e83fcbda97e6ad008e1d9bfb9d749d9ea8190502aef16.exe
Resource
win10v2004-20220812-en
General
-
Target
bd0920a53cf610d11b2e83fcbda97e6ad008e1d9bfb9d749d9ea8190502aef16
-
Size
176KB
-
MD5
e66728f8d88c42550f19516bb0fa07d2
-
SHA1
7efd956070ab22c574dae8e5b1e365b6710cc03c
-
SHA256
bd0920a53cf610d11b2e83fcbda97e6ad008e1d9bfb9d749d9ea8190502aef16
-
SHA512
1c119c9678bb4d0a9bcd5fc4a913f2e303393c6fdd98273eebeff8c46464840080825f9d53cfb79cb65ba9b3aa058ad2bf29dd6c1b2631e70d62012a869733d2
-
SSDEEP
3072:zSQqbDR/HjWQWI4tAP0kApjzUhpGGDV5xcoGiatrt:xeD9MI4c0k2A37DVopi0
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
bd0920a53cf610d11b2e83fcbda97e6ad008e1d9bfb9d749d9ea8190502aef16.exe windows x86
81ff62b872e157a7d0e36d93ff3129cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
CreateProcessA
GetStartupInfoA
TerminateThread
lstrcatA
GetCurrentDirectoryA
GetLocalTime
LocalSize
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
GetTempPathA
GetSystemDirectoryA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
FreeLibrary
GetProcAddress
LoadLibraryW
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateThread
GetModuleFileNameA
OpenProcess
QueryDosDeviceA
lstrcmpiA
GetPriorityClass
GetCurrentProcess
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
lstrcmpA
GetCurrentThreadId
GetVolumeInformationA
FlushFileBuffers
SetStdHandle
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
HeapSize
IsBadWritePtr
HeapReAlloc
HeapCreate
HeapDestroy
GetEnvironmentVariableA
SetUnhandledExceptionFilter
GetModuleHandleA
GetDiskFreeSpaceExA
GetDriveTypeA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
RemoveDirectoryA
GetFileSize
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
CancelIo
InterlockedExchange
SetEvent
Sleep
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
InitializeCriticalSection
SetLastError
TlsAlloc
ExitProcess
GetVersion
GetCommandLineA
ExitThread
TlsGetValue
TlsSetValue
HeapAlloc
HeapFree
RaiseException
RtlUnwind
user32
SendMessageA
GetKeyState
wsprintfA
GetForegroundWindow
GetAsyncKeyState
CharNextA
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
LoadCursorA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowTextA
IsWindowVisible
GetWindowThreadProcessId
PostMessageA
OpenWindowStationA
SetProcessWindowStation
GetLastInputInfo
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
gdi32
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
QueryServiceStatus
ControlService
DeleteService
OpenSCManagerA
EnumServicesStatusA
OpenServiceA
QueryServiceConfig2A
QueryServiceConfigA
CloseServiceHandle
RegQueryValueExA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
LookupAccountSidA
GetUserNameA
RegEnumValueA
RegEnumKeyExA
RegCloseKey
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
StartServiceA
shell32
SHGetFileInfoA
ws2_32
WSAIoctl
setsockopt
connect
inet_addr
htons
socket
select
recv
closesocket
send
getsockopt
gethostname
WSAStartup
WSACleanup
gethostbyname
inet_ntoa
psapi
GetProcessImageFileNameA
GetProcessMemoryInfo
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ