Behavioral task
behavioral1
Sample
df33b63f59d9d3885e84739c99f48da7c0b14c1eea61ee9f2e45f80ebc00749e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df33b63f59d9d3885e84739c99f48da7c0b14c1eea61ee9f2e45f80ebc00749e.exe
Resource
win10v2004-20220812-en
General
-
Target
df33b63f59d9d3885e84739c99f48da7c0b14c1eea61ee9f2e45f80ebc00749e
-
Size
108KB
-
MD5
f3e3a184634578c3fd1533374148a4e9
-
SHA1
64882727d0565b7e42611bf8dba9595d017f5d22
-
SHA256
df33b63f59d9d3885e84739c99f48da7c0b14c1eea61ee9f2e45f80ebc00749e
-
SHA512
91cc2d75b89b3a8710ed99258e5a7b2a6ec30b864def07af4a09e94049946cae27ae5d4ced10fc1a374c05e7b9ef7314bb0f31b23fa8be1d08c4e402b675db76
-
SSDEEP
1536:grlgkhKOkoKbu8ybomVIc+ikfxoUZa4pUm2:Iik/Kbuv5VIJiWxoUZa4pUm2
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
df33b63f59d9d3885e84739c99f48da7c0b14c1eea61ee9f2e45f80ebc00749e.exe windows x86
3355680c698597efcc5a13aeff459ce9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetSystemDirectoryA
GetLocalTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
FindNextFileA
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
OpenEventA
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
GetCurrentProcess
GetModuleFileNameA
LocalFree
FindClose
GetLogicalDriveStringsA
WriteFile
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcAddress
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
Sleep
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
LoadLibraryA
CreateEventA
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
GetVolumeInformationA
LocalReAlloc
TerminateProcess
user32
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
LoadCursorA
SystemParametersInfoA
WindowFromPoint
MapVirtualKeyA
GetDC
GetDesktopWindow
SetRect
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
SendMessageA
SetCapture
IsWindow
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
CharNextA
ReleaseDC
wsprintfA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
gdi32
BitBlt
CreateDIBSection
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
advapi32
RegOpenKeyExA
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
IsValidSid
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
msvcrt
__p__fmode
_strnicmp
_controlfp
__set_app_type
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
_errno
atoi
strncmp
rename
strrchr
_except_handler3
free
malloc
strchr
strstr
_ftol
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
memmove
ceil
ws2_32
gethostname
gethostbyname
__WSAFDIsSet
connect
setsockopt
WSAIoctl
recvfrom
sendto
WSACleanup
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
select
recv
ntohs
closesocket
htons
socket
WSAStartup
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
LLLK Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ