Behavioral task
behavioral1
Sample
ea8d3894e30e7966ec8672aebb77bf12c78149b6c1659a742d85bc25b10fed9b.exe
Resource
win7-20220812-en
General
-
Target
ea8d3894e30e7966ec8672aebb77bf12c78149b6c1659a742d85bc25b10fed9b
-
Size
184KB
-
MD5
449a9f1cd471cb6ce0a75354e037a63a
-
SHA1
64a3dd6681bd65b346925b74f246f06aa254d666
-
SHA256
ea8d3894e30e7966ec8672aebb77bf12c78149b6c1659a742d85bc25b10fed9b
-
SHA512
1c236ec3e3f1a1d5eb32f3b21639fa018468594f999679077aa88b433d8a7ac3c47373281cc8b5c21d4440dee8575a203bed0923271d8ab57502c9a82244bfe4
-
SSDEEP
3072:CCMIPytEtcWUK9dp1Kifjn3yxGTbiES9OTp9nZMo3dTku:VMYytZdAvtj3ySbnrHnZ7F
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
ea8d3894e30e7966ec8672aebb77bf12c78149b6c1659a742d85bc25b10fed9b.exe windows x86
60160ed8121145340a4226260593f62b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleHandleA
lstrlenA
GetLocalTime
FindResourceA
GetTickCount
GetModuleFileNameA
CreateThread
Sleep
ReleaseMutex
GetCommandLineA
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
GetLastError
RtlUnwind
HeapReAlloc
HeapAlloc
GetStartupInfoA
GetVersion
ExitProcess
HeapFree
VirtualFree
VirtualAlloc
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
WriteFile
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ