Behavioral task
behavioral1
Sample
bdb22a1e9bdd085d4d6c8f1cd2e1cfb39dfc2d91927423dafd3408c241bba248.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bdb22a1e9bdd085d4d6c8f1cd2e1cfb39dfc2d91927423dafd3408c241bba248.exe
Resource
win10v2004-20220812-en
General
-
Target
bdb22a1e9bdd085d4d6c8f1cd2e1cfb39dfc2d91927423dafd3408c241bba248
-
Size
508KB
-
MD5
05812dafda69b9b609bcb94cc3353f3b
-
SHA1
31b1a58eba6d21a28c4e8487ac2460aafcf10013
-
SHA256
bdb22a1e9bdd085d4d6c8f1cd2e1cfb39dfc2d91927423dafd3408c241bba248
-
SHA512
3e3c27551125a4ec47a3e52df6a4c6c648b8c5d3f2a242049a26274d2b98efbb1874e04320b4e5c1875a55cf15ebafdb7e7070f7bd4361966d74f1738f310be9
-
SSDEEP
12288:bxeAJlAghv3r+TsP9ytWHEjg6j8gMM5QUZ:bxRlAghv3r+TsP9yCEM6DMM5QU
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
bdb22a1e9bdd085d4d6c8f1cd2e1cfb39dfc2d91927423dafd3408c241bba248.exe windows x86
7a71aea8efd59136f05f67293af52005
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
kernel32
GlobalAlloc
GetModuleFileNameA
GetStartupInfoA
OpenProcess
Process32Next
ResetEvent
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GlobalLock
lstrcmpA
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
GlobalUnlock
GlobalFree
MultiByteToWideChar
Sleep
GetModuleHandleA
DeviceIoControl
LeaveCriticalSection
LoadLibraryA
GetProcAddress
WideCharToMultiByte
user32
GetClientRect
SendMessageA
GetDlgItem
SetDlgItemTextA
OpenDesktopA
CloseWindow
CreateWindowExA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
GetMessageA
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SystemParametersInfoA
BlockInput
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
MessageBoxA
CharNextA
wsprintfA
EndDialog
CreateDialogParamA
UpdateWindow
ShowWindow
SetWindowPos
GetDlgItemTextA
TranslateMessage
DispatchMessageA
PostMessageA
OpenClipboard
gdi32
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDIBSection
advapi32
LookupAccountNameA
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
LsaRetrievePrivateData
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
IsValidSid
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
SysFreeString
msvcrt
strncpy
atoi
exit
strrchr
_except_handler3
free
malloc
strchr
_purecall
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
??1type_info@@UAE@XZ
_errno
wcscpy
strncat
_beginthreadex
sprintf
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strnicmp
_strcmpi
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memcpy
strncmp
winmm
waveInOpen
waveInGetNumDevs
waveInPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInAddBuffer
waveInStart
waveOutWrite
waveOutPrepareHeader
waveInStop
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveOutClose
ws2_32
select
send
inet_ntoa
inet_addr
getsockname
bind
closesocket
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
WSAStartup
WSACleanup
recv
ntohs
socket
gethostbyname
htons
WSAIoctl
setsockopt
connect
getpeername
urlmon
URLDownloadToFileA
netapi32
NetUserAdd
NetLocalGroupAddMembers
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 408KB - Virtual size: 406KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ