Behavioral task
behavioral1
Sample
5b6bedc46d04a26c810d59d368a62ac566b83e848e500238454fea563b8b38f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b6bedc46d04a26c810d59d368a62ac566b83e848e500238454fea563b8b38f2.exe
Resource
win10v2004-20221111-en
General
-
Target
5b6bedc46d04a26c810d59d368a62ac566b83e848e500238454fea563b8b38f2
-
Size
139KB
-
MD5
f5e0308c244b4c8fb4b5edb046b89e47
-
SHA1
2eba2bda6f7a28aaf47659a0204f6c72381b0350
-
SHA256
5b6bedc46d04a26c810d59d368a62ac566b83e848e500238454fea563b8b38f2
-
SHA512
8b9c60cf4a9dd6160b48e41de91070ffd17f5734ed76c58a9c05fb6ef898fe1c71d5f5b875815b02c33c366e7b5a703d2a83c75ada21c450522391f96bd1a684
-
SSDEEP
3072:c9aL7FDG4FJRhpwQhnnRcNm9EG1shiAm2:maVKORrbhnRmDG9A9
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
5b6bedc46d04a26c810d59d368a62ac566b83e848e500238454fea563b8b38f2.exe windows x86
b781ed3a9c9b9708fad30e0129485d2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetLocalTime
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetModuleHandleA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
SetStdHandle
FlushFileBuffers
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
SetUnhandledExceptionFilter
TlsAlloc
ExitProcess
GetVersion
GetCommandLineA
ExitThread
TlsGetValue
TlsSetValue
HeapReAlloc
RaiseException
RtlUnwind
OpenProcess
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
CreateEventA
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
user32
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
GetWindowTextA
GetActiveWindow
SetClipboardData
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
mouse_event
CloseClipboard
SetCursorPos
GetKeyNameTextA
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
PostMessageA
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
IsWindow
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
keybd_event
MapVirtualKeyA
SetCapture
CloseWindow
CreateWindowExA
EnumWindows
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
WindowFromPoint
gdi32
DeleteObject
CreateCompatibleBitmap
GetDIBits
SelectObject
DeleteDC
BitBlt
CreateCompatibleDC
CreateDIBSection
advapi32
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
GetTokenInformation
LookupAccountSidA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
winmm
waveInStop
waveOutWrite
waveInReset
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInUnprepareHeader
waveInClose
waveOutReset
waveOutUnprepareHeader
waveInStart
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveOutClose
ws2_32
WSAStartup
WSACleanup
getsockname
gethostname
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
connect
setsockopt
WSAIoctl
imm32
ImmGetCompositionStringA
ImmGetContext
ImmReleaseContext
wininet
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICSeqCompressFrame
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ