Behavioral task
behavioral1
Sample
f8b04a1fc6d81490b578f7cd52b59b278231ac6dba7fc04c1ba23397628423af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f8b04a1fc6d81490b578f7cd52b59b278231ac6dba7fc04c1ba23397628423af.exe
Resource
win10v2004-20220812-en
General
-
Target
f8b04a1fc6d81490b578f7cd52b59b278231ac6dba7fc04c1ba23397628423af
-
Size
555KB
-
MD5
4dd4ae5b1ea06dec2f2625c209c70a90
-
SHA1
83bf73293008ce2626f07845c4520e449770f021
-
SHA256
f8b04a1fc6d81490b578f7cd52b59b278231ac6dba7fc04c1ba23397628423af
-
SHA512
4b0db5c10c36e7b6405608d686885d6824e63e2be8eea545bdf3b2580fa975a61144b6cad5c546a1b816a0b5b41efb1f4e4475b6795970b6828581488b3bb8ff
-
SSDEEP
12288:r+qJV8qVdiuir+TB44DeWf0lIqW2zgFwhHM5KIT3g7:rDmqVdiuir+TB44Dd02qW9FwhHM5DT3
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
f8b04a1fc6d81490b578f7cd52b59b278231ac6dba7fc04c1ba23397628423af.exe windows x86
c18cda4d7c72172d09f54e783009c968
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
LocalSize
MultiByteToWideChar
OpenProcess
LoadLibraryW
HeapFree
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetModuleHandleW
GetSystemInfo
GetVersionExA
GetModuleFileNameA
OpenEventW
SetErrorMode
GetComputerNameA
CreateMutexA
ExitProcess
GetCurrentThreadId
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
WaitForMultipleObjects
PeekNamedPipe
lstrcpyW
MoveFileExA
GetTempPathA
GetWindowsDirectoryA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualProtect
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
LoadLibraryA
GetProcAddress
FreeLibrary
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
lstrlenA
lstrcatA
WideCharToMultiByte
CreateThread
ResumeThread
Sleep
SetEvent
WaitForSingleObject
SetEndOfFile
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
HeapSize
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
SetUnhandledExceptionFilter
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
GetModuleHandleA
HeapReAlloc
RaiseException
RtlUnwind
TerminateThread
CloseHandle
CreateEventW
advapi32
RegOpenKeyExA
RegQueryValueExA
RegQueryValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
StartServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
QueryServiceStatus
ControlService
DeleteService
OpenSCManagerW
EnumServicesStatusA
OpenServiceA
QueryServiceConfigA
CloseServiceHandle
RegCreateKeyA
RegEnumValueA
RegQueryInfoKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegCloseKey
user32
CreateDialogParamA
SystemParametersInfoA
keybd_event
MapVirtualKeyA
UpdateWindow
DestroyCursor
SetWindowPos
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
SendMessageA
GetClientRect
LoadCursorA
ShowWindow
EndDialog
IsWindow
OpenDesktopA
CloseWindow
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
BlockInput
CharNextA
GetThreadDesktop
GetUserObjectInformationA
CloseDesktop
FindWindowA
GetClassNameA
GetWindowTextA
IsWindowVisible
GetWindowThreadProcessId
GetWindow
ExitWindowsEx
MessageBoxW
GetInputState
PostThreadMessageA
wsprintfW
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
wsprintfA
shell32
SHGetFileInfoA
ShellExecuteA
psapi
GetModuleFileNameExA
EnumProcessModules
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
winmm
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveInReset
waveInUnprepareHeader
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
oleaut32
SysFreeString
netapi32
NetUserEnum
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
NetApiBufferFree
shlwapi
PathRemoveFileSpecA
SHDeleteKeyA
avicap32
capCreateCaptureWindowW
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
Sections
.text Size: 466KB - Virtual size: 466KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE