PCShell
Behavioral task
behavioral1
Sample
494754684e4961771bff650091a33378bd01d3eaff4009073abccda545bcb8a3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
494754684e4961771bff650091a33378bd01d3eaff4009073abccda545bcb8a3.exe
Resource
win10v2004-20220812-en
General
-
Target
494754684e4961771bff650091a33378bd01d3eaff4009073abccda545bcb8a3
-
Size
62KB
-
MD5
6792ed1c41b648e8fe518a9c698821c0
-
SHA1
05b96b562933c01a00919d8ed2f3f7ac8359d046
-
SHA256
494754684e4961771bff650091a33378bd01d3eaff4009073abccda545bcb8a3
-
SHA512
7360007d22b4056f8aa1ad9526d9819f2b85af88e89880ec3ccc031903898ba36e7b82a621b735602bb07099e5e4ff53734aad6b19cb801d6e748aca13043cf8
-
SSDEEP
768:EVXyIZTa5JrhLO+4lL/THhKqqbPIsGce5LhG1yoYPifLTcOne2iwgRNwU+xPa:ENy0T0ha3/TTq6ct9ZfLTcKezwSB
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
494754684e4961771bff650091a33378bd01d3eaff4009073abccda545bcb8a3.exe windows x86
b20f8afd07e6e8d99b6aab2e78a6cbc5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
LocalFree
LocalAlloc
CreateFileA
ReadFile
SetFilePointer
GetModuleFileNameA
CreateProcessA
FreeLibrary
TerminateThread
ExitProcess
MoveFileA
DeleteFileA
ReleaseMutex
GetTickCount
OpenEventA
SetErrorMode
GetLastError
CreateThread
GetVersionExA
OutputDebugStringA
GetStartupInfoA
GetModuleHandleA
RaiseException
msvcrt
strchr
atoi
_beginthreadex
calloc
_exit
_XcptFilter
exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
rename
strrchr
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
_acmdln
memmove
??3@YAXPAX@Z
ceil
_strrev
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
Exports
Exports
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ