Behavioral task
behavioral1
Sample
db783cbafdb70a2d9cc26d5a6df18de1199362df6ba8934088acd86b89561cd3.exe
Resource
win7-20220812-en
General
-
Target
db783cbafdb70a2d9cc26d5a6df18de1199362df6ba8934088acd86b89561cd3
-
Size
260KB
-
MD5
992891b6a22006d49ccd510cedfb8328
-
SHA1
9b455055d96e39c3a35dbb7a2016a52ac0cd4da5
-
SHA256
db783cbafdb70a2d9cc26d5a6df18de1199362df6ba8934088acd86b89561cd3
-
SHA512
fa19304dfe58d05772d61a47b87b3baebab2eed520f571319370cfd8b73e22310cff759ffcef6328662bba3f5349755096874cac974e493927fc1ac38cbc3f1d
-
SSDEEP
6144:dVx3d4gxUeUqoTYFE1Ah4HoTZqsF08cxfWv:dn3S9es8E1AastFx0
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
db783cbafdb70a2d9cc26d5a6df18de1199362df6ba8934088acd86b89561cd3.exe windows x86
c61b25c77e0b3cab046182a90ef2f53a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetLocalTime
GetModuleHandleA
GetSystemInfo
GetComputerNameA
OpenEventA
GetTickCount
SetErrorMode
GetExitCodeProcess
GetShortPathNameA
GetModuleFileNameA
ExitProcess
CreateMutexA
GlobalFree
GlobalUnlock
CreateToolhelp32Snapshot
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
OutputDebugStringA
lstrcpyW
GlobalMemoryStatusEx
WinExec
lstrcmpiA
Module32Next
Module32First
CreateRemoteThread
GetCurrentThreadId
Process32First
OpenProcess
LocalSize
Process32Next
GetCurrentProcess
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
CreateEventA
GetWindowsDirectoryA
lstrcpyA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
GlobalLock
user32
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
GetProcessWindowStation
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
keybd_event
ReleaseDC
GetCursorInfo
GetCursorPos
GetWindowThreadProcessId
OpenWindowStationA
SetProcessWindowStation
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
CharNextA
wsprintfA
SendMessageA
DispatchMessageA
BlockInput
SystemParametersInfoA
DestroyCursor
GetDesktopWindow
LoadCursorA
IsWindow
CloseClipboard
TranslateMessage
GetMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
gdi32
DeleteObject
CreateDIBSection
BitBlt
GetDIBits
SelectObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
advapi32
LookupPrivilegeValueA
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
QueryServiceStatus
ControlService
RegCreateKeyExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
OpenProcessToken
RegQueryValueExA
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
CloseServiceHandle
RegSetValueExA
StartServiceA
OpenServiceA
CreateServiceA
OpenSCManagerA
StartServiceCtrlDispatcherA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
msvcrt
__setusermatherr
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_strcmpi
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
atol
_mbscmp
_mbsstr
_CxxThrowException
wcscpy
strncmp
wcstombs
wcslen
strncpy
mbstowcs
strncat
sprintf
atoi
exit
strrchr
_except_handler3
free
malloc
strchr
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
winmm
waveInReset
waveInStop
waveInUnprepareHeader
waveInStart
waveInAddBuffer
waveInOpen
waveInClose
waveOutReset
waveOutUnprepareHeader
waveOutWrite
waveInPrepareHeader
waveInGetNumDevs
waveOutPrepareHeader
waveOutClose
waveOutGetNumDevs
waveOutOpen
ws2_32
WSACleanup
setsockopt
connect
htons
gethostbyname
socket
select
recv
closesocket
send
getsockname
htonl
WSAStartup
WSAIoctl
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
netapi32
NetUserDel
NetUserSetInfo
NetUserGetLocalGroups
NetApiBufferFree
NetUserGetInfo
NetUserEnum
NetLocalGroupAddMembers
NetUserAdd
iphlpapi
GetTcpTable
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSEnumerateSessionsA
WTSQuerySessionInformationW
WTSFreeMemory
WTSLogoffSession
WTSDisconnectSession
WTSQuerySessionInformationA
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wtknqlz Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rmnet Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE