Behavioral task
behavioral1
Sample
6f9cb6f64f9e6d39a83aef4947ebeb3403b537794c412e4477dc2191e589de6d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f9cb6f64f9e6d39a83aef4947ebeb3403b537794c412e4477dc2191e589de6d.exe
Resource
win10v2004-20220812-en
General
-
Target
6f9cb6f64f9e6d39a83aef4947ebeb3403b537794c412e4477dc2191e589de6d
-
Size
128KB
-
MD5
6688d30dfc6a1c53ecee250a1d49da60
-
SHA1
45b6a3879381003404eab4685ee64f119cd90293
-
SHA256
6f9cb6f64f9e6d39a83aef4947ebeb3403b537794c412e4477dc2191e589de6d
-
SHA512
03a15a3941876ae1db3e16094d0fe75245fc0637deeba06492a7a1bab36055bf8b5f119ff400464d6d2aadf2b5ec49ec64f26a5bd4876a086d33fe68495c19a0
-
SSDEEP
3072:d7RQOBFnGpNTcrtIfZZcpeJMf3sxgkopa:zTfGpNTcZcZkiMf8xgBo
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
6f9cb6f64f9e6d39a83aef4947ebeb3403b537794c412e4477dc2191e589de6d.exe windows x86
ccf3ff5fcd0c3b76159c03097db78cc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
msvcrt
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
strrchr
__p__fmode
strncpy
wcscpy
atoi
strchr
strncmp
_errno
_strnicmp
_onexit
__dllonexit
_controlfp
__set_app_type
_strcmpi
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
calloc
_beginthreadex
sprintf
realloc
strncat
exit
rand
kernel32
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
InitializeCriticalSection
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetProcAddress
LoadLibraryA
SetLastError
GetCurrentProcess
CreateRemoteThread
VirtualAllocEx
FreeLibrary
OpenProcess
MultiByteToWideChar
ResetEvent
TerminateThread
GetTickCount
WinExec
OutputDebugStringA
GetModuleFileNameA
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
ExitProcess
GetWindowsDirectoryA
GetLocalTime
lstrcmpA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
CreateThread
DeleteCriticalSection
FindNextFileA
user32
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
CharNextA
wsprintfA
LoadCursorA
DestroyCursor
SystemParametersInfoA
SendMessageA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
GetClipboardData
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowTextA
GetSystemMetrics
gdi32
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
RegEnumValueA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
OpenProcessToken
LookupPrivilegeValueA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyA
RegSetValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegDeleteValueA
GetTokenInformation
RegDeleteKeyA
LookupAccountSidA
CreateServiceA
RegEnumKeyExA
ws2_32
listen
accept
sendto
bind
getsockname
recvfrom
__WSAFDIsSet
WSAGetLastError
gethostname
getpeername
inet_addr
inet_ntoa
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
connect
WSAStartup
WSACleanup
setsockopt
WSAIoctl
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
netapi32
NetLocalGroupAddMembers
NetUserAdd
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrameStart
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICCompressorFree
ICOpen
ICClose
ICSendMessage
iphlpapi
GetIfTable
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ