Behavioral task
behavioral1
Sample
a71edc1efe0ce6e7966571c4a3066e8fc71ebc934002e42afd5456c60617d76e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a71edc1efe0ce6e7966571c4a3066e8fc71ebc934002e42afd5456c60617d76e.exe
Resource
win10v2004-20220812-en
General
-
Target
a71edc1efe0ce6e7966571c4a3066e8fc71ebc934002e42afd5456c60617d76e
-
Size
98KB
-
MD5
e9cac093de4fc08cbad5cf4f3ffd831a
-
SHA1
5657ecb4f64d769c220f1d35fa8c4a9a49f3bb73
-
SHA256
a71edc1efe0ce6e7966571c4a3066e8fc71ebc934002e42afd5456c60617d76e
-
SHA512
dc75abda0f8e52273f26a8ef559cfc3d16d4a42f95a50c58e721a8f6122efbe00529525078b3c3233c44e8f4535eaffe4fd1b40e73a336ae1053c75dd7e6d7ee
-
SSDEEP
1536:EHCYPfVtkXqepioPPYYmfgFwh5E3FRZxNoZbbcBrHzfbhqq:EHCYPfV2XquPYYm7GXoZbbSrzbhqq
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
a71edc1efe0ce6e7966571c4a3066e8fc71ebc934002e42afd5456c60617d76e.exe windows x86
c9b402ed191f0938af801f84800e3eaa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
CreateProcessA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
HeapFree
MapViewOfFile
GetProcessHeap
UnmapViewOfFile
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
LocalSize
TerminateProcess
GlobalMemoryStatus
GetVersionExA
CopyFileA
GetModuleFileNameA
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
OpenEventA
SetErrorMode
CreateThread
CreateMutexA
GetCurrentProcess
HeapAlloc
GetProcAddress
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
SetEvent
WaitForSingleObject
Sleep
TerminateThread
CloseHandle
FreeLibrary
LoadLibraryA
CreateFileMappingA
RaiseException
advapi32
RegQueryValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
FreeSid
OpenSCManagerA
DeleteService
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegCloseKey
ole32
CoUninitialize
CoInitialize
CoCreateGuid
msvcrt
strstr
_CxxThrowException
rand
sprintf
strncpy
free
malloc
_except_handler3
strrchr
_beginthreadex
_snprintf
atoi
calloc
_ftol
_exit
_XcptFilter
_stricmp
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
ceil
putchar
memmove
__CxxFrameHandler
puts
??3@YAXPAX@Z
??2@YAPAXI@Z
_strrev
??1type_info@@UAE@XZ
exit
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Xran@std@@YAXXZ
Sections
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 83KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ