Behavioral task
behavioral1
Sample
75826d960c96bd4d26d5af111edfea8b8a60e5c8df369a83ae5694ca7b3f9a36.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
75826d960c96bd4d26d5af111edfea8b8a60e5c8df369a83ae5694ca7b3f9a36.exe
Resource
win10v2004-20220812-en
General
-
Target
75826d960c96bd4d26d5af111edfea8b8a60e5c8df369a83ae5694ca7b3f9a36
-
Size
121KB
-
MD5
91951ac26ad01b675e919b94f33208d4
-
SHA1
2d27d5ae26031fa4f2dc7ad90cac3d4c264e5bfc
-
SHA256
75826d960c96bd4d26d5af111edfea8b8a60e5c8df369a83ae5694ca7b3f9a36
-
SHA512
835f3a6f0b30b40270fe286a92b70400e7c7a7d0326b6dce7d414c8efdf7933951a807149e200873ed17d8c0c9d9470198aa00b09b81030cb8347abcc03fc02c
-
SSDEEP
3072:tWuVWAvDpiLvZ10R3D8eyAgUERuHrz7M8xyb3H6tljUeOv3ov:0uJULvZ1CgEgUU7+yb3HijU2v
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
75826d960c96bd4d26d5af111edfea8b8a60e5c8df369a83ae5694ca7b3f9a36.exe windows x86
268f6557c13386aebec4127a55018573
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
FreeLibrary
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
WritePrivateProfileStringA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
GetProcAddress
CancelIo
GetPrivateProfileStringA
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
SetThreadPriority
CreateThread
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LoadLibraryA
InitializeCriticalSection
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
InterlockedIncrement
InterlockedDecrement
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
TlsAlloc
SetLastError
HeapReAlloc
HeapSize
UnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
user32
wsprintfA
MessageBoxA
ExitWindowsEx
advapi32
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
ws2_32
inet_addr
send
select
recv
inet_ntoa
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
sendto
WSASocketA
htonl
gethostname
ntohs
closesocket
wininet
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE