Behavioral task
behavioral1
Sample
7acef979fbcac9c1c6697dd7b289b3d3f58f5dcfcf1287cfcdd42dbea68fb5cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7acef979fbcac9c1c6697dd7b289b3d3f58f5dcfcf1287cfcdd42dbea68fb5cd.exe
Resource
win10v2004-20220901-en
General
-
Target
7acef979fbcac9c1c6697dd7b289b3d3f58f5dcfcf1287cfcdd42dbea68fb5cd
-
Size
157KB
-
MD5
0f57fbb2c00af55339d7c6dba8a20e50
-
SHA1
67682691ea5de30ceac8f148aa1d37e6550ebe4d
-
SHA256
7acef979fbcac9c1c6697dd7b289b3d3f58f5dcfcf1287cfcdd42dbea68fb5cd
-
SHA512
c578aa2870e44789b0121e5c97c341af1f33793c8a993df03a42425938e476df571a315e2bfd8403408a56b4da600d3db0fb59757840f8a1361f695abb956265
-
SSDEEP
3072:Xh4YpNvlMlvTjrOZIEq91g1yVFjMKOpiH/iAAgy6t6eOv30Ic8vsoXMM:x4IEvvrOZIEcksjDUgyTyo0oXN
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
7acef979fbcac9c1c6697dd7b289b3d3f58f5dcfcf1287cfcdd42dbea68fb5cd.exe windows x86
eb2918dd7d32fc62954739599d78e4b2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
FreeLibrary
GetTickCount
GetTempPathA
WriteFile
SetFilePointer
CreateFileA
WritePrivateProfileStringA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
GetProcAddress
LoadLibraryA
GetPrivateProfileStringA
GetVersionExA
GetSystemDefaultUILanguage
ReleaseMutex
OpenEventA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
SetThreadPriority
CreateThread
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
TlsAlloc
SetLastError
HeapReAlloc
HeapSize
UnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
LocalAlloc
Sections
PAGE Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE1 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 21KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ