Behavioral task
behavioral1
Sample
8e826878a1d96ab17389ea0a0b77f8394ef61c6899979f9e6ca3d8b84c4e283a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e826878a1d96ab17389ea0a0b77f8394ef61c6899979f9e6ca3d8b84c4e283a.exe
Resource
win10v2004-20220901-en
General
-
Target
8e826878a1d96ab17389ea0a0b77f8394ef61c6899979f9e6ca3d8b84c4e283a
-
Size
704KB
-
MD5
a05e692e71569c7f6ffccc34d6ab3650
-
SHA1
6375e2426b473afe7c040fea407584b1e7d86c3e
-
SHA256
8e826878a1d96ab17389ea0a0b77f8394ef61c6899979f9e6ca3d8b84c4e283a
-
SHA512
860fec47463b9bf4b9917eaa3dc47abad60b76f6b42f65478d39e5335f1defdb91c7ba0e1e69ab48db030831f1b739ba051c49c5e16fd3544df1a079c518a0bb
-
SSDEEP
12288:/M5REAfL3aKHx5r+TuxXzNWJBhiFHzsVK2o8J:/M5RE23aKHx5r+TuxXzcBsFHUo8J
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
8e826878a1d96ab17389ea0a0b77f8394ef61c6899979f9e6ca3d8b84c4e283a.exe windows x86
6e823d9b1eea64189ab47ad8b130d058
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
GetModuleFileNameA
OpenProcess
SetFileAttributesA
CopyFileA
GlobalAlloc
GlobalLock
GlobalUnlock
GetStartupInfoA
WaitForSingleObject
GetLastError
CloseHandle
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
DeviceIoControl
GetVersion
LocalAlloc
FindClose
GetVolumeInformationA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetPrivateProfileStringA
FreeLibrary
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
InterlockedExchange
lstrcpyA
WideCharToMultiByte
LoadLibraryA
GetProcAddress
RaiseException
GetModuleHandleA
gdi32
GetDIBits
DeleteDC
DeleteObject
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumValueA
LsaOpenPolicy
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueA
RegOpenKeyExA
RegCloseKey
LsaFreeMemory
IsValidSid
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
_CxxThrowException
strlen
??1exception@@UAE@XZ
_strcmpi
_strnset
_strnicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_purecall
strchr
malloc
free
_except_handler3
strrchr
fclose
fwrite
fopen
exit
atoi
strncmp
strncpy
_errno
wcscpy
strncat
sprintf
_beginthreadex
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??0exception@@QAE@ABQBD@Z
memcpy
??0exception@@QAE@ABV0@@Z
??1type_info@@UAE@XZ
winmm
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveInPrepareHeader
waveInStop
waveOutWrite
waveInAddBuffer
waveInStart
waveOutOpen
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInReset
waveInUnprepareHeader
waveOutGetNumDevs
waveInClose
ws2_32
select
send
inet_ntoa
closesocket
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
recv
ntohs
socket
WSAStartup
WSACleanup
gethostbyname
htons
connect
setsockopt
WSAIoctl
inet_addr
netapi32
NetUserAdd
NetLocalGroupAddMembers
wtsapi32
WTSFreeMemory
Sections
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 428KB - Virtual size: 889KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ