Behavioral task
behavioral1
Sample
e5fcf3f0528c0be3fd84eb2cd107a4b77035841385d80e3e5e36ca0afe1c7e16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5fcf3f0528c0be3fd84eb2cd107a4b77035841385d80e3e5e36ca0afe1c7e16.exe
Resource
win10v2004-20220901-en
General
-
Target
e5fcf3f0528c0be3fd84eb2cd107a4b77035841385d80e3e5e36ca0afe1c7e16
-
Size
92KB
-
MD5
670808dfb330b3a8855cae1edaf23130
-
SHA1
08f69b51152bd5e232cb4cea379dfcc3391935aa
-
SHA256
e5fcf3f0528c0be3fd84eb2cd107a4b77035841385d80e3e5e36ca0afe1c7e16
-
SHA512
f051f5c0094b662150471d370072e59e306d63200b77fdf4cfff91ba27c7e9e5e7a08cbeef15763efc1646359e4cec96532378aa9f5491e543800e605e0ea3f8
-
SSDEEP
1536:6PzLZmOJ0sVVFYw5H4c7lHfL8qVBr2sxPSkQ6:6PtJ0yYw5H40l/L8qVBrrxPSkH
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
e5fcf3f0528c0be3fd84eb2cd107a4b77035841385d80e3e5e36ca0afe1c7e16.exe windows x86
5893e7f123b5dd48222a714fbd5c0ac1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetStartupInfoA
WriteFile
DeviceIoControl
GetVersionExA
GlobalMemoryStatus
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
MoveFileA
DeleteFileA
GetModuleFileNameA
CopyFileA
CreateThread
GetModuleHandleA
TerminateThread
CreateProcessA
InitializeCriticalSection
CreateFileA
LocalFree
GetDriveTypeA
lstrlenA
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetTickCount
user32
wsprintfA
ExitWindowsEx
OpenDesktopA
CharNextA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
advapi32
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegQueryValueExA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
shell32
SHGetFileInfoA
msvcrt
_initterm
_strrev
_controlfp
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strstr
??2@YAPAXI@Z
free
malloc
_except_handler3
strrchr
rename
vsprintf
mbstowcs
wcslen
wcstombs
atoi
wcscpy
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
ws2_32
recv
ntohs
socket
closesocket
htons
connect
setsockopt
select
send
getsockname
gethostbyname
WSAStartup
WSACleanup
WSAIoctl
gethostname
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ