Behavioral task
behavioral1
Sample
cc5d86cef8aa84494bd89cd8f27342be50c42275ef94858b9bcfbcdc959b2980.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc5d86cef8aa84494bd89cd8f27342be50c42275ef94858b9bcfbcdc959b2980.exe
Resource
win10v2004-20220901-en
General
-
Target
cc5d86cef8aa84494bd89cd8f27342be50c42275ef94858b9bcfbcdc959b2980
-
Size
878KB
-
MD5
8483540858f6be466ad569020a84c420
-
SHA1
0c9943c757cbc67591a63b941a85263c3e52414a
-
SHA256
cc5d86cef8aa84494bd89cd8f27342be50c42275ef94858b9bcfbcdc959b2980
-
SHA512
2c8132939c4abe7adc423a7e9310a12f2f40970dcda282d165ca18a2add40060777b5d8f745bbfbf4d4179fa4e9bc5b28d8b0b5b870d4d208dfe217198cbdf67
-
SSDEEP
24576:m/qsKUJ1sagaoJ1sagafoKsKUJ1sagafoMnU:zsUaVaAKsUaAx
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
cc5d86cef8aa84494bd89cd8f27342be50c42275ef94858b9bcfbcdc959b2980.exe windows x86
27aab3adb01021a83f0792e5d9136ed6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateRemoteThread
CreateThread
DeleteFileA
DuplicateHandle
ExitProcess
ExitThread
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetDriveTypeA
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetSystemTime
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
OpenProcess
ReadFile
ReadProcessMemory
ResumeThread
SetFileAttributesA
SizeofResource
Sleep
SuspendThread
VirtualAllocEx
VirtualProtect
WriteFile
WriteProcessMemory
user32
CharUpperA
DialogBoxParamW
MessageBoxA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegSetValueExA
psapi
EnumProcesses
Sections
.data Size: 280KB - Virtual size: 279KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ