Behavioral task
behavioral1
Sample
ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0.exe
Resource
win7-20220901-en
General
-
Target
ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0
-
Size
168KB
-
MD5
6fab44045e90ca4673c331bfd84f0ee9
-
SHA1
b9c5991228e3870266d0a7a7741734ad4f026ce5
-
SHA256
ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0
-
SHA512
05c75c864730a387646123210aeb359845c01219981d1a69958f886d9931a8e240ae1c05e3f72175549e84204e8758b789bb1ff3575da58b73c326bc2e858024
-
SSDEEP
3072:a55WhN9npi8X7+0rbaemqKKgrkF0tIjnK0LHB8BwXc4+4uFXBfOJ4lQHwmj3ypdX:a55WzZX7+0rb1mq+lIj3LHmBwXcxfXFP
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
ccf989ed46b37a95539e639d7d48202498f8fe1401e11e6190d3e4a124e255e0.exe windows x86
b4d38b089996f9efaaa5a7e742766df0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
LocalFree
LocalAlloc
ReadFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
OpenEventA
CreateMutexA
LockResource
LoadResource
FindResourceA
EnumResourceNamesA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetFileSize
CopyFileA
DefineDosDeviceA
GetCurrentThreadId
LocalReAlloc
MultiByteToWideChar
LocalSize
WideCharToMultiByte
lstrcpyW
WinExec
GlobalMemoryStatusEx
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
Module32Next
Module32First
CreateRemoteThread
GetModuleHandleA
OpenProcess
GetDiskFreeSpaceExA
GetDriveTypeA
SetFilePointer
lstrlenA
WriteFile
GetTempPathA
MoveFileExA
SetFileAttributesA
GetSystemDirectoryA
DeleteFileA
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
GetCurrentProcess
SetPriorityClass
GetCurrentThread
SetThreadPriority
ResumeThread
TerminateThread
lstrcpyA
GetWindowsDirectoryA
lstrcatA
GetStartupInfoA
CreateProcessA
GetFileAttributesA
GetLastError
MoveFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
FreeLibrary
CreateThread
ExitThread
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
SetEvent
GetProcAddress
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
Sleep
LoadLibraryA
CreateDirectoryA
user32
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
GetMessageA
PostThreadMessageA
SetClipboardData
RegisterClassA
LoadIconA
IsWindowVisible
CloseDesktop
SetThreadDesktop
OpenInputDesktop
IsWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SendMessageA
SystemParametersInfoA
BlockInput
wsprintfA
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
GetInputState
MessageBoxA
gdi32
GetDIBits
BitBlt
GetStockObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
SelectObject
CreateCompatibleBitmap
DeleteDC
advapi32
CloseEventLog
OpenProcessToken
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
QueryServiceStatus
ControlService
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyA
DeleteService
OpenServiceA
OpenSCManagerA
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
msvcrt
_iob
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
memcpy
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
_snprintf
_beginthreadex
atol
_mbscmp
_mbsstr
wcscpy
wcstombs
wcslen
mbstowcs
_errno
strncmp
atoi
realloc
strncat
exit
strrchr
_except_handler3
free
malloc
strchr
strncpy
sprintf
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strstr
rand
ws2_32
ioctlsocket
WSAStartup
WSACleanup
__WSAFDIsSet
recvfrom
listen
accept
getpeername
bind
ntohs
inet_ntoa
getsockname
gethostname
htonl
sendto
inet_addr
send
closesocket
recv
select
socket
gethostbyname
WSAIoctl
setsockopt
connect
htons
WSASocketA
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
urlmon
URLDownloadToFileA
avicap32
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrame
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
netapi32
NetUserGetInfo
NetUserDel
NetUserSetInfo
NetUserGetLocalGroups
NetApiBufferFree
NetUserEnum
NetLocalGroupAddMembers
NetUserAdd
wtsapi32
WTSEnumerateSessionsA
WTSFreeMemory
WTSQuerySessionInformationA
WTSDisconnectSession
WTSLogoffSession
WTSQuerySessionInformationW
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ