Behavioral task
behavioral1
Sample
c53659fefe8f4fcb9252263972af188317daa9031c41b2e60e42e3dea68ebd66.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c53659fefe8f4fcb9252263972af188317daa9031c41b2e60e42e3dea68ebd66.exe
Resource
win10v2004-20221111-en
General
-
Target
c53659fefe8f4fcb9252263972af188317daa9031c41b2e60e42e3dea68ebd66
-
Size
99KB
-
MD5
a729f97edc50606cf5a5bdc33d1a0d5f
-
SHA1
586df8882aaf1158deca467709f68b0ccf61a3a9
-
SHA256
c53659fefe8f4fcb9252263972af188317daa9031c41b2e60e42e3dea68ebd66
-
SHA512
4c846560d39d8fb81bd80ac102f3f720122abfcb92badf2fb1434bc675c379167f8755a0d4f6881859f3c219a931fbc96587c17275e6375d049d4c0f31a17b6d
-
SSDEEP
3072:FYR8aLTicZUIp2N/P696++AsCV7yPM0yx:e8aQd6sHAsCV7yPM0yx
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
c53659fefe8f4fcb9252263972af188317daa9031c41b2e60e42e3dea68ebd66.exe windows x86
2183542d313e8ea8868a030e02ced8fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
CreateProcessA
lstrcatA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
OpenProcess
ExitThread
GetTickCount
WinExec
OutputDebugStringA
GetModuleFileNameA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableA
GetShortPathNameA
ReleaseMutex
OpenEventA
SetErrorMode
ExitProcess
CreateMutexA
CopyFileA
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
RaiseException
GetModuleHandleA
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
_initterm
__set_app_type
_controlfp
__getmainargs
_acmdln
__CxxFrameHandler
_XcptFilter
_exit
_onexit
__dllonexit
calloc
_beginthreadex
strncmp
strchr
strncat
exit
printf
time
srand
rand
atoi
strrchr
_except_handler3
malloc
free
strstr
_ftol
ceil
memmove
__p__fmode
_strnicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_strcmpi
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
mfc42
ord537
ord6648
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord939
ord6877
ord800
ord540
msvfw32
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
ICOpen
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ