Behavioral task
behavioral1
Sample
84e34e2c52c613aa708671d9177a1251a129f33eece60d96abf4884b71f6aeb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84e34e2c52c613aa708671d9177a1251a129f33eece60d96abf4884b71f6aeb0.exe
Resource
win10v2004-20221111-en
General
-
Target
84e34e2c52c613aa708671d9177a1251a129f33eece60d96abf4884b71f6aeb0
-
Size
152KB
-
MD5
98e9cf4b776f9def9917ae7088bd166e
-
SHA1
9f9c30cdc60102d0fedee3eb0ccaad2a57857a2d
-
SHA256
84e34e2c52c613aa708671d9177a1251a129f33eece60d96abf4884b71f6aeb0
-
SHA512
628e992a8f7d2976c1c0aba4819340cb363a85886559df5474ff397cfe471b955a340c5ffa2fb4e96ba5bb5de4ea5a2f37455f18b4200218b1efc86dabdc85cc
-
SSDEEP
3072:XleFv+DKxKpQqR/gWGnzxG2Oj56fWnPVGrvycKf:XcAhe/nzE35gaPQrvyc
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
84e34e2c52c613aa708671d9177a1251a129f33eece60d96abf4884b71f6aeb0.exe windows x86
415d7fd8b3f3164e95105dd371356ef5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
OpenEventA
CreateMutexA
CreateDirectoryA
CopyFileA
DefineDosDeviceA
GetCurrentThreadId
MultiByteToWideChar
ReadFile
lstrcpyW
LocalReAlloc
LocalSize
GlobalMemoryStatusEx
WinExec
lstrcmpiA
CreateToolhelp32Snapshot
Module32Next
Module32First
CreateRemoteThread
GetModuleHandleA
OpenProcess
GetDiskFreeSpaceExA
GetDriveTypeA
RaiseException
LocalAlloc
LocalFree
CreateFileA
GetFileSize
SetFilePointer
lstrlenA
WriteFile
MoveFileExA
SetFileAttributesA
DeleteFileA
GetShortPathNameA
GetEnvironmentVariableA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
TerminateThread
lstrcpyA
lstrcatA
GetStartupInfoA
CreateProcessA
GetFileAttributesA
GetLastError
MoveFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
FreeLibrary
CreateThread
ExitThread
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
Sleep
LoadLibraryA
WideCharToMultiByte
user32
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
GetMessageA
PostThreadMessageA
GetInputState
EmptyClipboard
LoadIconA
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
IsWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
wsprintfA
SetClipboardData
CloseClipboard
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
MessageBoxA
RegisterClassA
gdi32
GetStockObject
CreateCompatibleBitmap
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
GetDIBits
BitBlt
advapi32
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
QueryServiceStatus
ControlService
RegDeleteKeyA
CreateServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyA
DeleteService
OpenServiceA
OpenSCManagerA
RegOpenKeyA
OpenProcessToken
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcrt
strncmp
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
_snprintf
_beginthreadex
atol
_mbscmp
_mbsstr
wcscpy
wcstombs
wcslen
mbstowcs
_errno
memcpy
atoi
realloc
strncat
exit
strrchr
_except_handler3
free
malloc
strchr
strncpy
sprintf
rand
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strstr
wininet
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
urlmon
URLDownloadToFileA
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICOpen
netapi32
NetUserGetLocalGroups
NetUserSetInfo
NetUserEnum
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
NetApiBufferFree
NetUserGetInfo
wtsapi32
WTSLogoffSession
WTSQuerySessionInformationW
WTSFreeMemory
WTSQuerySessionInformationA
WTSDisconnectSession
WTSEnumerateSessionsA
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ