Behavioral task
behavioral1
Sample
9b6d44443299fe67f7929db9a55f8489e86b19f389bd8630a8590f952771f8f2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b6d44443299fe67f7929db9a55f8489e86b19f389bd8630a8590f952771f8f2.exe
Resource
win10v2004-20221111-en
General
-
Target
9b6d44443299fe67f7929db9a55f8489e86b19f389bd8630a8590f952771f8f2
-
Size
138KB
-
MD5
17063c0de1f8ddd0ea388fb013adf8f3
-
SHA1
193e438177ee0ce762e65bccf3a38d9f28bd5c9f
-
SHA256
9b6d44443299fe67f7929db9a55f8489e86b19f389bd8630a8590f952771f8f2
-
SHA512
9487517e4d023b86d806629f25a1b6838c19962938e89538721b4cf6e971d9f599a010933bf4234103d7515b4eb811e20be7ce76e0ec2f5f08849d4748b5f90a
-
SSDEEP
3072:o2NmT1IcoHRLkOJuiNS8xjXGhPp768jiGAzachcMen8Dg:oHT1Ic+fciN3xjXoxrjxvcOMw
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
9b6d44443299fe67f7929db9a55f8489e86b19f389bd8630a8590f952771f8f2.exe windows x86
08d5f5901bd0e783b167b765d5831072
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateThread
ReadFile
SetFilePointer
ExitProcess
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetCommandLineA
GlobalMemoryStatus
lstrcatA
GetSystemDirectoryA
TerminateThread
GetTickCount
lstrcpyA
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
WriteFile
lstrlenA
FreeResource
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleA
lstrcmpiA
CloseHandle
GetStartupInfoA
LoadLibraryA
MoveFileA
GetProcAddress
user32
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
SetWindowLongA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DefWindowProcA
mouse_event
SetCursorPos
GetWindowTextA
GetClassNameA
GetWindow
SetForegroundWindow
IsWindow
GetCursorPos
WindowFromPoint
GetWindowRect
GetTopWindow
SendMessageA
wsprintfA
GetDesktopWindow
advapi32
RegCloseKey
RegCreateKeyA
GetUserNameA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
GetAce
AddAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
SHCreateDirectoryExA
msvcrt
_except_handler3
strchr
??3@YAXPAX@Z
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strstr
malloc
realloc
??2@YAPAXI@Z
netapi32
NetUserGetLocalGroups
NetApiBufferFree
ws2_32
inet_addr
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ