Behavioral task
behavioral1
Sample
89959417436c5b902b378bd2fe5e90b9a49f2ffcf972ae0bc7795ea82c530b17.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89959417436c5b902b378bd2fe5e90b9a49f2ffcf972ae0bc7795ea82c530b17.exe
Resource
win10v2004-20220812-en
General
-
Target
89959417436c5b902b378bd2fe5e90b9a49f2ffcf972ae0bc7795ea82c530b17
-
Size
180KB
-
MD5
541243cad6582a25aa63186cba7db871
-
SHA1
872283085d00a694ac9be8ac6632ba968217fd2f
-
SHA256
89959417436c5b902b378bd2fe5e90b9a49f2ffcf972ae0bc7795ea82c530b17
-
SHA512
f6cebcd8caa58f106fde6db11325c8626a50dec0042e440a21818515d868ee8351f322e432c6bef47ef5022f91fcad14194206c388f50acb36ca5364d886a0d4
-
SSDEEP
3072:ePjpUy8IBXA0N/LEKxRrrxdu+/BS75HQ1p5ZTEyPUfd6Gc39eY2w:ePVUyZd/40RrFd5/Biw
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
89959417436c5b902b378bd2fe5e90b9a49f2ffcf972ae0bc7795ea82c530b17.exe windows x86
5893e7f123b5dd48222a714fbd5c0ac1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetStartupInfoA
WriteFile
DeviceIoControl
GetVersionExA
GlobalMemoryStatus
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
MoveFileA
DeleteFileA
GetModuleFileNameA
CopyFileA
CreateThread
GetModuleHandleA
TerminateThread
CreateProcessA
InitializeCriticalSection
CreateFileA
LocalFree
GetDriveTypeA
lstrlenA
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetTickCount
user32
wsprintfA
ExitWindowsEx
OpenDesktopA
CharNextA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
advapi32
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegQueryValueExA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
shell32
SHGetFileInfoA
msvcrt
_initterm
_strrev
_controlfp
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strstr
??2@YAPAXI@Z
free
malloc
_except_handler3
strrchr
rename
vsprintf
mbstowcs
wcslen
wcstombs
atoi
wcscpy
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
ws2_32
recv
ntohs
socket
closesocket
htons
connect
setsockopt
select
send
getsockname
gethostbyname
WSAStartup
WSACleanup
WSAIoctl
gethostname
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ