Behavioral task
behavioral1
Sample
92449ccf090ef16697a226419edf724b138ee7eb12380bade16706d8dd056b03.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
92449ccf090ef16697a226419edf724b138ee7eb12380bade16706d8dd056b03.exe
Resource
win10v2004-20220812-en
General
-
Target
92449ccf090ef16697a226419edf724b138ee7eb12380bade16706d8dd056b03
-
Size
116KB
-
MD5
d33e93943940e960cd1d2232c86e5176
-
SHA1
ee751b056483a29a81b55d27aa1a1881cd892a4b
-
SHA256
92449ccf090ef16697a226419edf724b138ee7eb12380bade16706d8dd056b03
-
SHA512
60fdb6c488d31899cf5fe64a1dbb5838a0b05306faffbb279629be9f6d3fb5afdb889eef92c80a61cf3df6f2acdd3aa3582913b0dc6d6cb47525ed5447b69925
-
SSDEEP
1536:p4Lmcw5Kfd+KLHNEvpzmRNAHTvRQ1h5DKTQaAzVGSqleySq8smztlOT:pmmD5Md+KLHMuNCQn5DzMDlGq8PztlO
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
92449ccf090ef16697a226419edf724b138ee7eb12380bade16706d8dd056b03.exe windows x86
57fef113fb8764921419469db487ddeb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
lstrcpyA
lstrlenA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
GetTickCount
GetVersionExA
ExpandEnvironmentStringsA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
CancelIo
TerminateThread
GetLocalTime
GetModuleFileNameA
CreateProcessA
GetSystemDirectoryA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetCurrentThreadId
FlushFileBuffers
SetStdHandle
LCMapStringW
LCMapStringA
InterlockedExchange
SetEvent
WaitForSingleObject
CloseHandle
CreateEventA
LoadLibraryA
VirtualAlloc
VirtualFree
LoadLibraryW
GetOEMCP
GetACP
GetProcAddress
CreateThread
FreeLibrary
GetCPInfo
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
RtlUnwind
RaiseException
HeapFree
HeapAlloc
TlsSetValue
TlsGetValue
ExitThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TlsAlloc
SetLastError
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
user32
CharNextA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
CloseDesktop
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenInputDesktop
OpenDesktopA
MessageBoxA
wsprintfA
advapi32
RegQueryValueA
RegQueryValueExW
OpenEventLogA
CloseEventLog
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyExW
shell32
SHGetFileInfoA
iphlpapi
GetAdaptersAddresses
dnsapi
DnsFree
DnsQuery_A
ws2_32
getsockname
inet_addr
inet_ntoa
closesocket
recv
connect
htons
socket
WSAStartup
select
send
Sections
.text Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Fly Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Solo Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ