Behavioral task
behavioral1
Sample
513412098db67bdc4cc8f246d8cd0ee5fb850e1e09c0644cba7dc0b6f9a87949.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
513412098db67bdc4cc8f246d8cd0ee5fb850e1e09c0644cba7dc0b6f9a87949.exe
Resource
win10v2004-20220812-en
General
-
Target
513412098db67bdc4cc8f246d8cd0ee5fb850e1e09c0644cba7dc0b6f9a87949
-
Size
452KB
-
MD5
09a185d602a956a520d61abecff3104b
-
SHA1
9a66fb1fd9244f19e8d6a508bc82e290beecefc7
-
SHA256
513412098db67bdc4cc8f246d8cd0ee5fb850e1e09c0644cba7dc0b6f9a87949
-
SHA512
bddb3dbf646ef69306b43d3298454a2809958ee2a1ba925d168658e9c2061b7a6050d0cefbc3eec59fdd95275d46bd106ec31b0b4676564b41fa5cd47bc79338
-
SSDEEP
12288:vEsaRkySFJT6ucH+fOkEXRTrC6/mdD0o:v5akya65/mdD0
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
513412098db67bdc4cc8f246d8cd0ee5fb850e1e09c0644cba7dc0b6f9a87949.exe windows x86
0be459b0a3d1e61e4592fabe01f94458
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
ExitThread
GetTickCount
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
GetSystemDirectoryA
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
ReleaseMutex
OpenEventA
SetErrorMode
GetModuleFileNameA
ExitProcess
CreateMutexA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetCurrentThreadId
MoveFileA
WriteFile
GetFileSize
SetFilePointer
ReadFile
CreateFileA
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateEventA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
LoadLibraryA
GetProcAddress
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
TerminateProcess
GetModuleHandleA
RaiseException
gdi32
DeleteDC
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
advapi32
GetTokenInformation
LookupAccountSidA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
shell32
SHGetFileInfoA
msvcrt
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__dllonexit
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strnicmp
calloc
_beginthreadex
sprintf
atol
strncat
exit
wcscpy
_errno
strncmp
printf
time
srand
rand
atoi
strncpy
strrchr
_except_handler3
free
malloc
strchr
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
__setusermatherr
??2@YAPAXI@Z
_strcmpi
winmm
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveInReset
waveInUnprepareHeader
ws2_32
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
ntohs
recv
closesocket
WSAGetLastError
__WSAFDIsSet
recvfrom
listen
accept
getpeername
bind
getsockname
gethostname
inet_ntoa
WSASocketA
inet_addr
send
sendto
htonl
select
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
mfc42
ord939
ord2764
ord4129
ord6648
ord537
ord926
ord924
ord922
ord535
ord858
ord800
ord2818
ord540
ord6877
ord4278
ord860
ord6663
netapi32
NetLocalGroupAddMembers
NetUserAdd
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 312KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ