Behavioral task
behavioral1
Sample
c69bcba65d134cc1797c103637b9ba0bbe903d4ce7379c657f667b682e175fa3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c69bcba65d134cc1797c103637b9ba0bbe903d4ce7379c657f667b682e175fa3.exe
Resource
win10v2004-20220812-en
General
-
Target
c69bcba65d134cc1797c103637b9ba0bbe903d4ce7379c657f667b682e175fa3
-
Size
669KB
-
MD5
636c4b1e091ed40524b5ef99c38a020d
-
SHA1
c3f1ffd2555e31369bdd178118a7575cdcc73d0e
-
SHA256
c69bcba65d134cc1797c103637b9ba0bbe903d4ce7379c657f667b682e175fa3
-
SHA512
bf5b22173449ea750ced98e57639665a6f736d7ba26067172d76071b0a2d530b9d9d7da3c6a47ca52f96c2d03e161e9db73cef01eb123236d87aae8ea1fe27d1
-
SSDEEP
12288:NMpKvAPkvCF4/tLMNaf/fN4cC3VDggz7z3p93+HqY28:NMpvPfaFLMYHfN0n3T/Y28
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
c69bcba65d134cc1797c103637b9ba0bbe903d4ce7379c657f667b682e175fa3.exe windows x86
936f510ba7deac6cda3ff2722ad43e70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
WaitForSingleObject
CreateProcessA
MoveFileA
WritePrivateProfileStringA
GetCurrentDirectoryA
ExpandEnvironmentStringsA
SetFilePointer
VirtualFree
VirtualAlloc
ExitProcess
GetCommandLineA
GetStringTypeA
LCMapStringW
GetVersionExA
lstrcatA
lstrlenA
SetLastError
lstrcmpiA
lstrcpyA
LoadLibraryA
GetProcAddress
GetTempPathA
CloseHandle
GetTickCount
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteFileA
Sleep
FreeResource
GetModuleFileNameA
CreateFileA
WriteFile
ReadFile
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetVersion
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
SetConsoleCtrlHandler
MultiByteToWideChar
LCMapStringA
GetStringTypeW
user32
wsprintfA
advapi32
InitializeSecurityDescriptor
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
OpenServiceA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegQueryValueExA
RegCloseKey
RegSetValueExA
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ifc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE