Behavioral task
behavioral1
Sample
1310d787d78c71715751aa2faa33b7fadd3b900355bd7a0257ccf8d627596c72.exe
Resource
win7-20220812-en
General
-
Target
1310d787d78c71715751aa2faa33b7fadd3b900355bd7a0257ccf8d627596c72
-
Size
124KB
-
MD5
05210078fc7c00e42aa10ea2d92c25fb
-
SHA1
8bc6af633e3579fd3859499e4d23738f6d753ef3
-
SHA256
1310d787d78c71715751aa2faa33b7fadd3b900355bd7a0257ccf8d627596c72
-
SHA512
434c5cb13645648a86691aafb943b1573ba02ae23f6341d19aea141845d114a3320fcc7247dd08e41e0ad8c041e5c7fc0851b9731e94a115f15dd0cd0df73be3
-
SSDEEP
3072:e9ojTnQrCvYwdS7fswKu/i1iRuVpqK0PxPrxam/1i:e9yTnQrCQwdS7kQ/Kz/6PxPlc
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
1310d787d78c71715751aa2faa33b7fadd3b900355bd7a0257ccf8d627596c72.exe windows x86
79e9a12f3bd6de6b7152f84dec15c41b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
FreeLibrary
GetWindowsDirectoryA
GetTempPathA
GetLastError
lstrcatA
GetCurrentProcess
DeleteFileA
CopyFileA
MoveFileExA
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
ExitProcess
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
WaitForSingleObject
CreateRemoteThread
GetVersion
MultiByteToWideChar
MoveFileA
lstrlenA
SizeofResource
SetFileTime
LoadResource
GetTickCount
lstrcmpiA
SetLastError
ReadFile
SetFilePointer
WideCharToMultiByte
FreeResource
LocalFileTimeToFileTime
SystemTimeToFileTime
CreateFileA
SetUnhandledExceptionFilter
Sleep
WinExec
GetCurrentThreadId
RaiseException
InterlockedExchange
LocalAlloc
GetStartupInfoA
GetModuleHandleA
msvcrt
??3@YAXPAX@Z
strncmp
strtoul
isdigit
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strtok
strchr
malloc
realloc
_except_handler3
_strrev
_strnset
_strlwr
_stricmp
Sections
00000000 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
33333333 Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
333 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
222 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
111 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ