Behavioral task
behavioral1
Sample
c43c2ad0fe1dc762fb9d8be9b675520825f399e7f5180c6b68be424047fa8346.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c43c2ad0fe1dc762fb9d8be9b675520825f399e7f5180c6b68be424047fa8346.exe
Resource
win10v2004-20220812-en
General
-
Target
c43c2ad0fe1dc762fb9d8be9b675520825f399e7f5180c6b68be424047fa8346
-
Size
136KB
-
MD5
80a95acdb214f9044bc14a4a45be7de0
-
SHA1
1971b46e50c043cb064e964a9ce7903ab00deb73
-
SHA256
c43c2ad0fe1dc762fb9d8be9b675520825f399e7f5180c6b68be424047fa8346
-
SHA512
dfcf46e4028e24f5a381fec3564257708d64fa169249e31b010a555c70b6d922c4f84b7a76d067355a7230459a087983d22336f85d891b9a0e4a0c233bcb4ee6
-
SSDEEP
3072:ckhINxn2T4qKWEJK8Yrz3G2s3hIUxOYvME0hZBfK2x:yj2ePsY3a4OB/fK2
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
c43c2ad0fe1dc762fb9d8be9b675520825f399e7f5180c6b68be424047fa8346.exe windows x86
418c9c11dce055efef56c21b584750de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetTickCount
GetSystemDirectoryA
ExitProcess
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetLocalTime
CreateEventA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
VirtualFree
GetFileSize
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
LocalSize
OpenProcess
GetCurrentProcess
GetCurrentThreadId
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
GetModuleFileNameA
DuplicateHandle
OpenEventA
ExpandEnvironmentStringsA
CopyFileA
GetModuleHandleA
CloseHandle
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
lstrcpyA
CancelIo
InterlockedExchange
GetProcAddress
ResetEvent
Sleep
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateThread
ResumeThread
SetEvent
TerminateThread
LoadLibraryA
GetStartupInfoA
user32
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
LoadCursorA
MapVirtualKeyA
SystemParametersInfoA
SendMessageA
ReleaseDC
GetDC
GetDesktopWindow
SetRect
GetCursorInfo
GetCursorPos
ExitWindowsEx
GetWindowThreadProcessId
GetInputState
PostThreadMessageA
DispatchMessageA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
MessageBoxA
EnumWindows
GetWindowTextA
CharNextA
wsprintfA
GetMessageA
TranslateMessage
DestroyCursor
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
gdi32
DeleteDC
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
advapi32
LsaFreeMemory
CreateServiceA
LockServiceDatabase
ChangeServiceConfig2A
UnlockServiceDatabase
OpenServiceA
StartServiceA
StartServiceCtrlDispatcherA
RegOpenKeyA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenSCManagerA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
LookupAccountSidA
GetTokenInformation
shell32
ShellExecuteA
SHGetFileInfoA
SHGetSpecialFolderPathA
msvcrt
_strnicmp
__getmainargs
_strnset
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_strrev
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_access
sprintf
rand
_beginthreadex
_except_handler3
strncat
puts
_errno
strncpy
strncmp
atoi
strrchr
free
malloc
strchr
strstr
_ftol
ceil
memmove
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
winmm
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInClose
ws2_32
gethostbyname
htons
socket
setsockopt
WSAIoctl
WSAStartup
recv
select
__WSAFDIsSet
recvfrom
sendto
WSACleanup
accept
getpeername
bind
getsockname
ntohs
inet_addr
inet_ntoa
send
connect
closesocket
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
msvfw32
ICSeqCompressFrameStart
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrame
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
AAA Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ