Behavioral task
behavioral1
Sample
78e1156e34577cb98301b1dc64eae0959226d396b0973a76e7c3d744af6a5f3f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78e1156e34577cb98301b1dc64eae0959226d396b0973a76e7c3d744af6a5f3f.exe
Resource
win10v2004-20221111-en
General
-
Target
78e1156e34577cb98301b1dc64eae0959226d396b0973a76e7c3d744af6a5f3f
-
Size
164KB
-
MD5
5a553afe4a5f255f900eb0c69155dc00
-
SHA1
996c8b1c7cece387fec1b58dfd3d3f258c95233e
-
SHA256
78e1156e34577cb98301b1dc64eae0959226d396b0973a76e7c3d744af6a5f3f
-
SHA512
833858ac5fd5a9ed540e3631fcc65b0b414b15b6dcc389d4c8d7ed8f5ff8fad339a24805c4249c1d1ebd1b4eca5357475a862bc0e8dd4e2d7e7218444bfe455b
-
SSDEEP
3072:yDB3bLLc3ZyhhKaWsLId5I7d94uK0sRCf6yNwaJSTzO:jg7WsLYU9PeRCf6C5+
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
78e1156e34577cb98301b1dc64eae0959226d396b0973a76e7c3d744af6a5f3f.exe windows x86
fd25b207a76df64102e82f4ba3ec1c13
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrameStart
ICSendMessage
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSeqCompressFrame
wininet
InternetReadFile
InternetOpenA
InternetCloseHandle
kernel32
lstrcatA
GetWindowsDirectoryA
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersionExA
MultiByteToWideChar
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GlobalMemoryStatusEx
OutputDebugStringA
GetSystemInfo
GetModuleFileNameA
CopyFileA
OpenProcess
CreateEventA
GetPrivateProfileSectionNamesA
GetLastError
RaiseException
GetStartupInfoA
GetModuleHandleA
DeleteCriticalSection
GetProcAddress
LoadLibraryA
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
GetTickCount
GetLocalTime
Sleep
CloseHandle
WaitForSingleObject
CreateThread
FreeLibrary
GetCurrentProcessId
HeapAlloc
GetProcessHeap
lstrlenA
user32
ReleaseDC
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
DestroyCursor
WindowFromPoint
SetCapture
SendMessageA
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
MessageBoxA
CharNextA
GetCursorPos
wsprintfA
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
PostMessageA
CloseWindow
IsWindow
mouse_event
CreateWindowExA
advapi32
RegOpenKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
IsValidSid
RegEnumValueA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegCreateKeyExA
RegSetValueExA
RegQueryValueA
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
RegCloseKey
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
msvcrt
strrchr
_except_handler3
free
malloc
strchr
strncpy
sprintf
puts
putchar
rand
memcpy
??2@YAPAXI@Z
strstr
_ftol
atoi
strncmp
_errno
wcscpy
exit
strncat
_beginthreadex
calloc
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_controlfp
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_strnicmp
_strcmpi
??0exception@@QAE@ABV0@@Z
strlen
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
atol
ceil
memmove
_CxxThrowException
??3@YAXPAX@Z
__CxxFrameHandler
urlmon
URLDownloadToFileA
netapi32
NetUserAdd
NetLocalGroupAddMembers
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSQuerySessionInformationA
WTSFreeMemory
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ