Behavioral task
behavioral1
Sample
0ce492ea066ff44b384083ff454bce1462c13a52343e36c9fb5f32d43b89175d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0ce492ea066ff44b384083ff454bce1462c13a52343e36c9fb5f32d43b89175d.exe
Resource
win10v2004-20221111-en
General
-
Target
0ce492ea066ff44b384083ff454bce1462c13a52343e36c9fb5f32d43b89175d
-
Size
138KB
-
MD5
554b18e76317097f98464c2419184a49
-
SHA1
4dd74cf55974675a65be4e39303ff0b706843c06
-
SHA256
0ce492ea066ff44b384083ff454bce1462c13a52343e36c9fb5f32d43b89175d
-
SHA512
a2c73b641c9e74f316ccc8f0af05157e6b5b1f9b3ffb73f87988db772541d976fab8ccc2d8760232367623ea183c243430563a3a646965b9d9eff15eabf72e76
-
SSDEEP
3072:o2NmT1IcoHRLkOJuiNS8xjXGhPp768jiGAzachcMen8DC:oHT1Ic+fciN3xjXoxrjxvcOMS
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
0ce492ea066ff44b384083ff454bce1462c13a52343e36c9fb5f32d43b89175d.exe windows x86
08d5f5901bd0e783b167b765d5831072
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateThread
ReadFile
SetFilePointer
ExitProcess
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetCommandLineA
GlobalMemoryStatus
lstrcatA
GetSystemDirectoryA
TerminateThread
GetTickCount
lstrcpyA
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
WriteFile
lstrlenA
FreeResource
GetLastError
HeapAlloc
GetProcessHeap
HeapFree
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleA
lstrcmpiA
CloseHandle
GetStartupInfoA
LoadLibraryA
MoveFileA
GetProcAddress
user32
DispatchMessageA
TranslateMessage
GetMessageA
UpdateWindow
ShowWindow
SetWindowLongA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
DefWindowProcA
mouse_event
SetCursorPos
GetWindowTextA
GetClassNameA
GetWindow
SetForegroundWindow
IsWindow
GetCursorPos
WindowFromPoint
GetWindowRect
GetTopWindow
SendMessageA
wsprintfA
GetDesktopWindow
advapi32
RegCloseKey
RegCreateKeyA
GetUserNameA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
GetAce
AddAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
OpenServiceA
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
SHCreateDirectoryExA
msvcrt
_except_handler3
strchr
??3@YAXPAX@Z
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strstr
malloc
realloc
??2@YAPAXI@Z
netapi32
NetUserGetLocalGroups
NetApiBufferFree
ws2_32
inet_addr
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ