Behavioral task
behavioral1
Sample
1b85702efc0b1a9bafbcf474470bb6f4db3127913384a0add8989c80d58e091c.exe
Resource
win7-20220812-en
General
-
Target
1b85702efc0b1a9bafbcf474470bb6f4db3127913384a0add8989c80d58e091c
-
Size
166KB
-
MD5
61930d3887f86055252822ca2f826370
-
SHA1
170d680eeee23e9e897fb76ce715a3645443d68c
-
SHA256
1b85702efc0b1a9bafbcf474470bb6f4db3127913384a0add8989c80d58e091c
-
SHA512
4578da008f1174ab32a349cbe734d637a878147e74e2bbcbd59b64af1476e1d4e9740f1b388546797815df3d8e0d74f258aaf130c8d560772d03d89c01e347ac
-
SSDEEP
3072:ayMA+RRrjU/yEYayy41oQ94r79NcR6G7BOfK2HMnylzQWUuZp:ahA+R50YaPtQ2r79NGvBwvM20W
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
1b85702efc0b1a9bafbcf474470bb6f4db3127913384a0add8989c80d58e091c.exe windows x86
5728ea492c3add368d676f53b8d443b4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
DeleteFileA
HeapFree
GlobalFree
GlobalUnlock
OutputDebugStringA
ExitProcess
OpenEventA
SetErrorMode
RaiseException
GetStartupInfoA
GetModuleHandleA
SetLastError
GetLastError
GetModuleFileNameA
SetFilePointer
WriteFile
CreateFileA
RemoveDirectoryA
LocalAlloc
LocalFree
GetVolumeInformationA
TerminateThread
GetDriveTypeA
CreateDirectoryA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcessHeap
HeapAlloc
FreeLibrary
CreateThread
GetLocalTime
GetTickCount
Sleep
InterlockedExchange
SetEvent
CreateEventA
VirtualAlloc
EnterCriticalSection
VirtualFree
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CreateProcessA
DeviceIoControl
GetVersion
GetDiskFreeSpaceExA
GetCurrentProcess
DeleteCriticalSection
GetProcAddress
CloseHandle
LoadLibraryA
ReleaseMutex
user32
WindowFromPoint
SetCursorPos
SetClipboardData
EmptyClipboard
GetClipboardData
LoadCursorA
SystemParametersInfoA
SendMessageA
ReleaseDC
GetDC
GetDesktopWindow
SetRect
GetCursorPos
wsprintfA
SetCapture
MapVirtualKeyA
SetProcessWindowStation
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
OpenInputDesktop
GetUserObjectInformationA
OpenDesktopA
PostMessageA
IsWindow
keybd_event
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
CharNextA
TranslateMessage
DispatchMessageA
CloseWindow
gdi32
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
LookupAccountNameA
LsaOpenPolicy
LsaClose
IsValidSid
RegQueryValueA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
LsaFreeMemory
shell32
SHGetFileInfoA
msvcrt
free
_strnicmp
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
strtok
wcscpy
_errno
strncmp
atoi
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_CxxThrowException
rand
putchar
puts
sprintf
strncpy
strchr
malloc
_strupr
_except_handler3
strrchr
rename
shlwapi
SHDeleteKeyA
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 133KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didat Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE