Behavioral task
behavioral1
Sample
429e2ec5e04b4430a2a0a4999cd6266b4c220ee8fa6eceba311ed9a439a89435.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
429e2ec5e04b4430a2a0a4999cd6266b4c220ee8fa6eceba311ed9a439a89435.exe
Resource
win10v2004-20221111-en
General
-
Target
429e2ec5e04b4430a2a0a4999cd6266b4c220ee8fa6eceba311ed9a439a89435
-
Size
120KB
-
MD5
b44c7c27d538c4faf34e8dea1e563301
-
SHA1
f48bcc2528aad450f78079cd50a9e84f2ee778a4
-
SHA256
429e2ec5e04b4430a2a0a4999cd6266b4c220ee8fa6eceba311ed9a439a89435
-
SHA512
9c20272a098882d0236e326659a75a84afa734e49a756a7e1d57c14048c035fa2660bc187142cd0d1e4bd3e00b3251111e499f41c95733bd462d0a9340104446
-
SSDEEP
3072:ejhhfYKiOvrovD9naEUDIZs3ZVxmpvXwtYo:ItZypn3AIO3T8pPwH
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
429e2ec5e04b4430a2a0a4999cd6266b4c220ee8fa6eceba311ed9a439a89435.exe windows x86
fa16d5da616fea8b61b24c3c3397efde
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
SetThreadPriority
GetCurrentThread
CreateFileA
GetEnvironmentVariableA
GetShortPathNameA
OpenEventA
CreateMutexA
CopyFileA
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
GetFileSize
RemoveDirectoryA
GetLocalTime
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcAddress
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
Sleep
ResumeThread
GetSystemDirectoryA
ExitProcess
GetCurrentProcess
GetModuleFileNameA
WriteFile
SetFilePointer
LocalAlloc
ReadFile
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
LoadLibraryA
CreateEventA
SetPriorityClass
user32
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
LoadCursorA
SystemParametersInfoA
WindowFromPoint
MapVirtualKeyA
GetDC
GetDesktopWindow
SetRect
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
SendMessageA
SetCapture
IsWindow
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
CharNextA
ReleaseDC
wsprintfA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
gdi32
BitBlt
CreateDIBSection
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
advapi32
CloseServiceHandle
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegOpenKeyExA
OpenServiceA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
SetServiceStatus
StartServiceCtrlDispatcherA
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
LookupAccountSidA
GetTokenInformation
RegQueryValueA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
msvcrt
__p__fmode
_strnicmp
_controlfp
__set_app_type
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
exit
rand
strncat
_errno
atoi
strncmp
rename
strrchr
_except_handler3
free
malloc
strchr
strstr
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
memmove
ceil
_ftol
ws2_32
gethostname
gethostbyname
__WSAFDIsSet
connect
setsockopt
WSAIoctl
recvfrom
sendto
WSACleanup
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
select
recv
ntohs
closesocket
htons
socket
WSAStartup
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
LLLK Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ