Behavioral task
behavioral1
Sample
4052c100ea784df08068b83ccd50d0db11ff7583cb0488604bd243004a562e98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4052c100ea784df08068b83ccd50d0db11ff7583cb0488604bd243004a562e98.exe
Resource
win10v2004-20220812-en
General
-
Target
4052c100ea784df08068b83ccd50d0db11ff7583cb0488604bd243004a562e98
-
Size
176KB
-
MD5
679f40eecf97e9fda34da16aaa5198c0
-
SHA1
94b5e66ba4821b5aaa105bffca3d5ff7dda010de
-
SHA256
4052c100ea784df08068b83ccd50d0db11ff7583cb0488604bd243004a562e98
-
SHA512
0d19d2a2b91b722b0ad5abf43240029ab85221c66421c60aba792660d8faced68fbd02b0bc6615d926f95c6eae6fbca3bafe47b695349baf0955de76eafd0959
-
SSDEEP
3072:0CG+t9xnehlwo0BMHbvum1YoinbPiEuFsI0jp5I+XO:V1ner0sum1DQPj+sI0jp5IZ
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
4052c100ea784df08068b83ccd50d0db11ff7583cb0488604bd243004a562e98.exe windows x86
f6c3bcbca21890cbab2f06e0a0f0e564
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
lstrlenA
GetLocalTime
SizeofResource
GetProcAddress
LoadLibraryA
CreateFileA
LoadResource
FindResourceA
Sleep
LockResource
FreeResource
CopyFileA
ExitProcess
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
ReadFile
SetEndOfFile
GetOEMCP
GetACP
CreateThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapAlloc
HeapFree
GetLastError
WriteFile
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
SetFilePointer
GetCPInfo
CreateDirectoryA
user32
EnumWindows
GetWindowTextA
SendMessageA
wsprintfA
LoadIconA
RegisterClassExA
CreateWindowExA
DefWindowProcA
advapi32
RegOpenKeyExA
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ