Behavioral task
behavioral1
Sample
195d683c6b2eb387843b906e96a49f014e18c9e066e4a63902d3df51d5c876be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
195d683c6b2eb387843b906e96a49f014e18c9e066e4a63902d3df51d5c876be.exe
Resource
win10v2004-20220812-en
General
-
Target
195d683c6b2eb387843b906e96a49f014e18c9e066e4a63902d3df51d5c876be
-
Size
312KB
-
MD5
3657c05fb735b84cca2c2813d4ea171a
-
SHA1
41fe67c8fea2f8e67d576dff455f8bf3370bbdf7
-
SHA256
195d683c6b2eb387843b906e96a49f014e18c9e066e4a63902d3df51d5c876be
-
SHA512
80fd05e754894c0bece4fd6e5598b45dbe4c9cc1673879834359a16c93fdfe798a5484f066b5e13804925b77368564585b7441f6fa4f1b15c149abbe29d15a99
-
SSDEEP
3072:KgRIswVDYIy+hmCRSHlyQyIW8t/Yc+KVtEpUr0s53J4:KgRIcIyHbHY5IW8NNRcir39m
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
195d683c6b2eb387843b906e96a49f014e18c9e066e4a63902d3df51d5c876be.exe windows x86
b43b5a309949d380acaf0b6936259ba9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
GetFileType
WriteFile
IsBadReadPtr
IsBadCodePtr
GetCPInfo
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetHandleCount
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
SetStdHandle
FlushFileBuffers
CloseHandle
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
InterlockedIncrement
InterlockedDecrement
LoadLibraryA
SetFilePointer
GetProcAddress
HeapSize
IsBadWritePtr
RtlUnwind
RaiseException
HeapAlloc
HeapFree
GetLastError
MoveFileA
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
user32
MessageBoxA
CharNextA
TranslateMessage
DispatchMessageA
GetSystemMetrics
IsWindow
SendMessageA
CreateWindowExA
CloseDesktop
ShowWindow
DefWindowProcA
GetCursorPos
GetDC
ExitWindowsEx
SetRect
EmptyClipboard
SetClipboardData
CloseClipboard
keybd_event
WindowFromPoint
MapVirtualKeyA
SystemParametersInfoA
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
EnumWindows
gdi32
DeleteDC
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
winmm
waveOutClose
ws2_32
htons
__WSAFDIsSet
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
psapi
GetModuleFileNameExA
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ