Behavioral task
behavioral1
Sample
b07fc3936625fe592ee45d5c35c2b3afcabb4c4beefc623bc857ca33bd896870.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b07fc3936625fe592ee45d5c35c2b3afcabb4c4beefc623bc857ca33bd896870.exe
Resource
win10v2004-20220812-en
General
-
Target
b07fc3936625fe592ee45d5c35c2b3afcabb4c4beefc623bc857ca33bd896870
-
Size
140KB
-
MD5
f88aba7f0a33d317012f3048974ebbf9
-
SHA1
3e85123d36b362a7fea22e04499dc4ce0ccabc96
-
SHA256
b07fc3936625fe592ee45d5c35c2b3afcabb4c4beefc623bc857ca33bd896870
-
SHA512
4b575673569500a3fc142134e27eaf00a4794f42ac5dd24fde0e1fcbdbf90817382f43d60a7e33678aa1fd39419df3abd9bf3348eddff14003a0c71cd9ea2de2
-
SSDEEP
3072:d1RIh3JtBwcmBtgIYkb8j3aCTSc5dqBLScO2LRj:4MYk2aMJ7qBLlO2J
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
b07fc3936625fe592ee45d5c35c2b3afcabb4c4beefc623bc857ca33bd896870.exe windows x86
ba10eaa3da68e0d9e3dc68099ed8ab8a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GlobalSize
GetTickCount
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetCurrentProcess
GetSystemInfo
SetErrorMode
LocalSize
OpenProcess
GetCurrentThreadId
GetStartupInfoA
GetModuleHandleA
WinExec
CreateProcessA
GetLastError
GetModuleFileNameA
DeleteFileA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
GlobalLock
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
WaitForSingleObject
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetVersionExA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
TerminateThread
CloseHandle
CreateEventA
LoadLibraryA
GlobalUnlock
GlobalFree
GetProcessHeap
HeapFree
CreateToolhelp32Snapshot
Process32First
Process32Next
LocalAlloc
InitializeCriticalSection
GetProcAddress
CreateThread
ResumeThread
Sleep
SetEvent
GlobalMemoryStatus
user32
MessageBoxA
GetWindowTextA
EnumWindows
GetForegroundWindow
BlockInput
SendMessageA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
CloseWindow
CreateWindowExA
IsWindow
GetMessageA
wsprintfA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorPos
GetCursorInfo
SetRect
GetDesktopWindow
GetDC
ReleaseDC
DestroyCursor
LoadCursorA
GetSystemMetrics
GetClipboardData
gdi32
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
AdjustTokenPrivileges
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
LsaFreeMemory
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
LsaOpenPolicy
shell32
ShellExecuteA
SHGetSpecialFolderPathA
SHGetFileInfoA
msvcrt
_errno
_snprintf
strncmp
strtok
strncat
realloc
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
_strrev
_strnicmp
_strupr
atoi
_strcmpi
strrchr
strncpy
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
sprintf
_except_handler3
free
malloc
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
ceil
_ftol
strstr
memmove
strchr
_XcptFilter
shlwapi
SHDeleteKeyA
winmm
waveInAddBuffer
waveInStart
waveOutClose
waveInPrepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInOpen
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveOutUnprepareHeader
waveInGetNumDevs
ws2_32
WSACleanup
WSAIoctl
setsockopt
send
connect
htons
gethostbyname
socket
ntohs
recv
closesocket
gethostname
WSAGetLastError
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
select
getpeername
bind
getsockname
inet_addr
inet_ntoa
WSAStartup
accept
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Xran@std@@YAXXZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetGetConnectedState
msvfw32
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
userenv
CreateEnvironmentBlock
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
AAA Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ