Behavioral task
behavioral1
Sample
8ac1a719f92c74fc79f4e10f93d0b4deadf652f7f180f81c155313dc7c481c9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ac1a719f92c74fc79f4e10f93d0b4deadf652f7f180f81c155313dc7c481c9a.exe
Resource
win10v2004-20220812-en
General
-
Target
8ac1a719f92c74fc79f4e10f93d0b4deadf652f7f180f81c155313dc7c481c9a
-
Size
176KB
-
MD5
076b840baa02bd30ad62e7e8f40dc321
-
SHA1
a4ff0ac8a273106421ee9f86ae4e80f849b19389
-
SHA256
8ac1a719f92c74fc79f4e10f93d0b4deadf652f7f180f81c155313dc7c481c9a
-
SHA512
424749f359188ff4b03308162e5d6825377926c226bc811a460dfbe2c9e39464c1a1a948b924c0582c1909e22a85f4eafba88ca9ed98fc0ece088e373f405225
-
SSDEEP
3072:8UfUxt4xDLoWg8Qv1WMZk+8mQquC5ZhB+1hFSbLz8ltEh8kI:78b6LoJv1dZk+8IRZDChFOz8ltE
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
8ac1a719f92c74fc79f4e10f93d0b4deadf652f7f180f81c155313dc7c481c9a.exe windows x86
24bedf0d8dc1e0628ab228b6d7fe5720
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
ReadFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
OpenEventA
CreateMutexA
CopyFileA
GetCurrentThreadId
LocalFree
WideCharToMultiByte
lstrcpyW
LocalReAlloc
LocalSize
GlobalMemoryStatusEx
lstrcmpiA
Process32First
Module32Next
Module32First
CreateRemoteThread
GetModuleHandleA
OpenProcess
FreeLibrary
GetDiskFreeSpaceExA
GetDriveTypeA
GetLocalTime
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
WriteFile
GetTempPathA
GetTickCount
MoveFileExA
SetFileAttributesA
GetSystemDirectoryA
DeleteFileA
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
CreateThread
TerminateThread
lstrcpyA
GetWindowsDirectoryA
lstrcatA
GetStartupInfoA
CreateProcessA
GetFileAttributesA
GetProcAddress
GetLastError
MoveFileA
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
Sleep
LoadLibraryA
MultiByteToWideChar
user32
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
GetMessageA
PostThreadMessageA
SetClipboardData
RegisterClassA
LoadIconA
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
IsWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
SystemParametersInfoA
SendMessageA
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
MessageBoxA
wsprintfA
GetInputState
gdi32
GetStockObject
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
SelectObject
CreateDIBSection
advapi32
OpenProcessToken
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
QueryServiceStatus
ControlService
RegDeleteKeyA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCloseKey
RegSetValueExA
DeleteService
OpenServiceA
OpenSCManagerA
RegQueryValueExA
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
msvcrt
??1type_info@@UAE@XZ
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
_onexit
__dllonexit
memcpy
calloc
_snprintf
_beginthreadex
atol
_mbscmp
_mbsstr
wcscpy
wcstombs
wcslen
mbstowcs
_errno
strncpy
strncmp
rand
atoi
realloc
strncat
exit
strrchr
sprintf
_except_handler3
free
malloc
strchr
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
ws2_32
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
ntohs
WSAStartup
WSACleanup
inet_addr
inet_ntoa
getsockname
gethostname
closesocket
recv
select
socket
gethostbyname
WSAIoctl
setsockopt
connect
htons
send
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
iphlpapi
GetIfTable
netapi32
NetUserGetInfo
NetUserDel
NetUserSetInfo
NetUserGetLocalGroups
NetApiBufferFree
NetUserEnum
NetLocalGroupAddMembers
NetUserAdd
wtsapi32
WTSEnumerateSessionsA
WTSFreeMemory
WTSQuerySessionInformationA
WTSDisconnectSession
WTSLogoffSession
WTSQuerySessionInformationW
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ