Behavioral task
behavioral1
Sample
a2d81c5d990a409a3537c9cf64502e606c496d0cdc12cb1a497012f44a34620f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a2d81c5d990a409a3537c9cf64502e606c496d0cdc12cb1a497012f44a34620f.exe
Resource
win10v2004-20220901-en
General
-
Target
a2d81c5d990a409a3537c9cf64502e606c496d0cdc12cb1a497012f44a34620f
-
Size
513KB
-
MD5
229c2a71694c00efdf7a6a595c9836c0
-
SHA1
b692eaf426c2777baa0c1e137ce9c266395e916b
-
SHA256
a2d81c5d990a409a3537c9cf64502e606c496d0cdc12cb1a497012f44a34620f
-
SHA512
087ecfbda6d1dc3a55647674a826bb0b8be7c3505cbd8e3285ceeb1d7eae1a835ba41651d662b3e3ffb581169c05dda1855df693790744a6d006cf5dd1b9b34a
-
SSDEEP
12288:pZ4TDDmNOzKnDAWo1s5MV6VIzqUAWo1s5MV6VIzqdp:Q/qsKUJ1saga8J1sagaIp
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
a2d81c5d990a409a3537c9cf64502e606c496d0cdc12cb1a497012f44a34620f.exe windows x86
27aab3adb01021a83f0792e5d9136ed6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateRemoteThread
CreateThread
DeleteFileA
DuplicateHandle
ExitProcess
ExitThread
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetDriveTypeA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetSystemTime
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
OpenProcess
ReadFile
ReadProcessMemory
ResumeThread
SetFileAttributesA
SizeofResource
Sleep
SuspendThread
VirtualAllocEx
VirtualProtect
WriteFile
WriteProcessMemory
user32
CharUpperA
DialogBoxParamW
MessageBoxA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegSetValueExA
psapi
EnumProcesses
Sections
.data Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ