Behavioral task
behavioral1
Sample
7f14a69af04954653deb0162223eab4a5134b210204591e123f0d023632935d5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7f14a69af04954653deb0162223eab4a5134b210204591e123f0d023632935d5.exe
Resource
win10v2004-20220901-en
General
-
Target
7f14a69af04954653deb0162223eab4a5134b210204591e123f0d023632935d5
-
Size
83KB
-
MD5
0e6a8452eeb47e7c4e4325aae745aa40
-
SHA1
fa9db7a220c6345ab4b11e91fb5391f0278c9e60
-
SHA256
7f14a69af04954653deb0162223eab4a5134b210204591e123f0d023632935d5
-
SHA512
f06ad8a0564760d136265cf549862a8b2e723550b40f281621a412643be858152d880ea973bf88cdaf577cafae1a237af97e1ecef95f909f8f387f4ca4ca9a8b
-
SSDEEP
1536:EaX1LZvagAjulzy2WkIkbcVq2fUqKnacD5/5C4XS:EaX1ZASIfzkbyqgUqKacDWmS
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
7f14a69af04954653deb0162223eab4a5134b210204591e123f0d023632935d5.exe windows x86
536969af3956dd214f9cfa045501fa77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetOpenA
kernel32
GetDiskFreeSpaceExA
lstrlenA
GetVolumeInformationA
GetLogicalDriveStringsA
LocalFree
LocalReAlloc
LocalAlloc
CloseHandle
CreateFileA
WriteFile
GetLastError
GetFileAttributesA
CreateProcessA
GetProcAddress
LoadLibraryA
GetDriveTypeA
GetVersion
DeviceIoControl
TerminateThread
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
GetVersionExA
GetModuleFileNameA
OpenEventA
CreateThread
CreateMutexA
LocalSize
TerminateProcess
OpenProcess
Process32Next
CreateToolhelp32Snapshot
GetCurrentThreadId
Sleep
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
GetStartupInfoA
GetCurrentProcess
user32
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowTextA
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetClipboardData
OpenDesktopA
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
PostMessageA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
ExitWindowsEx
MessageBoxA
wsprintfA
OpenClipboard
GetSystemMetrics
gdi32
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
CreateCompatibleBitmap
SelectObject
advapi32
RegQueryValueA
RegCloseKey
shell32
SHGetFileInfoA
msvcrt
atoi
strncat
strchr
exit
strrchr
malloc
_except_handler3
_CxxThrowException
_beginthreadex
__CxxFrameHandler
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
calloc
free
??1type_info@@UAE@XZ
_exit
_XcptFilter
_acmdln
__getmainargs
_strcmpi
_initterm
??2@YAPAXI@Z
_strnicmp
__setusermatherr
strstr
_ftol
??3@YAXPAX@Z
memmove
ceil
ws2_32
closesocket
recv
socket
select
htons
connect
setsockopt
send
gethostname
WSAIoctl
WSAStartup
gethostbyname
getsockname
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
urlmon
URLDownloadToFileA
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ