Behavioral task
behavioral1
Sample
f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19.exe
Resource
win10v2004-20220901-en
General
-
Target
f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19
-
Size
88KB
-
MD5
6db66372a6e75d625d0a39ee62311642
-
SHA1
80de56254107024863e9a19618b79ac2fcf4f8f6
-
SHA256
f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19
-
SHA512
d012a6da9d72442d7e7dabc6190c2e159266a04e52f967a9618dcf061d9a2bb03a9dd86c746bc3718724bda112ed8a66708248db6a95ad5455c9da01858fe698
-
SSDEEP
1536:vfxhMKyqADbY/B7iud3c8TGIOvnToIftA0T3kQa:vv5p0bYJpd3c8w/TBftA0bkQa
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
f1a5e9d135bfc2f81334b78e75fc8ea9327edb509ec24e4754fadf7379b6fb19.exe windows x86
5270cd75c81cb654922eaa6576403312
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
TerminateThread
SetFileAttributesA
MoveFileExA
MoveFileA
GetTempPathA
GetModuleFileNameA
DeleteFileA
lstrcmpiA
CreateToolhelp32Snapshot
HeapAlloc
VirtualProtect
IsBadReadPtr
Process32First
GetCurrentProcess
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
OpenEventA
GetExitCodeProcess
GetShortPathNameA
ExitProcess
CreateMutexA
GetCurrentThreadId
GetStartupInfoA
GetModuleHandleA
GetLastError
Process32Next
CreateThread
GetTickCount
lstrcatA
lstrlenA
lstrcpyA
GetSystemDirectoryA
TerminateProcess
CreateProcessA
GetProcessHeap
HeapFree
GetFileAttributesA
ReadFile
GetWindowsDirectoryA
GetFileSize
CreateFileA
SetFilePointer
WriteFile
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
Sleep
DeleteCriticalSection
FreeLibrary
InitializeCriticalSection
user32
GetLastInputInfo
EnumWindows
SendMessageA
GetClientRect
GetSystemMetrics
GetWindowTextA
MessageBoxA
DrawIcon
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsIconic
wsprintfA
advapi32
RegSetValueExA
CloseServiceHandle
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyA
RegQueryValueExA
OpenServiceA
DeleteService
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
CreateServiceA
StartServiceCtrlDispatcherA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
StartServiceA
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
ShellExecuteA
msvcrt
memmove
_setmbcp
_strnicmp
_stricmp
_strupr
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
printf
sprintf
ceil
_ftol
strstr
??2@YAPAXI@Z
strrchr
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
_beginthreadex
strchr
strncat
_except_handler3
realloc
exit
puts
free
malloc
ws2_32
connect
setsockopt
WSAIoctl
htons
gethostbyname
socket
WSAStartup
recv
getsockname
gethostname
send
closesocket
WSACleanup
select
mfc42
ord1168
ord4234
ord2379
ord755
ord470
ord1576
ord815
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
iphlpapi
GetIfTable
GetAdaptersInfo
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ