Behavioral task
behavioral1
Sample
e3fb48d418d9bc4088be46d8a391d3af5adea9bc4637559f5b52cc4b80f2bd8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e3fb48d418d9bc4088be46d8a391d3af5adea9bc4637559f5b52cc4b80f2bd8c.exe
Resource
win10v2004-20220901-en
General
-
Target
e3fb48d418d9bc4088be46d8a391d3af5adea9bc4637559f5b52cc4b80f2bd8c
-
Size
669KB
-
MD5
755f30a067e27b8f80b5a000bb53f1d6
-
SHA1
6aac7237975bc6563ce7a77294782862392ca121
-
SHA256
e3fb48d418d9bc4088be46d8a391d3af5adea9bc4637559f5b52cc4b80f2bd8c
-
SHA512
2202168263dde762f5438c9b997eefbc58c56ed590bb0bdd166aa3009dc976b8b66e109ffcfdc57bfd07b52f8b3f34e61791eda0b2835857ad7029612fcfcba7
-
SSDEEP
12288:bMp1vAPkvCF4/tLMNaf/fN4JPTlKUthk9r7W:bMpePfaFLMYHfNicKk7W
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
e3fb48d418d9bc4088be46d8a391d3af5adea9bc4637559f5b52cc4b80f2bd8c.exe windows x86
936f510ba7deac6cda3ff2722ad43e70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
WaitForSingleObject
CreateProcessA
MoveFileA
WritePrivateProfileStringA
GetCurrentDirectoryA
ExpandEnvironmentStringsA
SetFilePointer
VirtualFree
VirtualAlloc
ExitProcess
GetCommandLineA
GetStringTypeA
LCMapStringW
GetVersionExA
lstrcatA
lstrlenA
SetLastError
lstrcmpiA
lstrcpyA
LoadLibraryA
GetProcAddress
GetTempPathA
CloseHandle
GetTickCount
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteFileA
Sleep
FreeResource
GetModuleFileNameA
CreateFileA
WriteFile
ReadFile
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetVersion
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
SetConsoleCtrlHandler
MultiByteToWideChar
LCMapStringA
GetStringTypeW
user32
wsprintfA
advapi32
InitializeSecurityDescriptor
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
OpenServiceA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegSetKeySecurity
FreeSid
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegQueryValueExA
RegCloseKey
RegSetValueExA
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.khe Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE