Behavioral task
behavioral1
Sample
bd04d967e4ae68389966795ce98735c3c3f12c2a85779f38965d1a3c1efd7be4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd04d967e4ae68389966795ce98735c3c3f12c2a85779f38965d1a3c1efd7be4.exe
Resource
win10v2004-20220812-en
General
-
Target
bd04d967e4ae68389966795ce98735c3c3f12c2a85779f38965d1a3c1efd7be4
-
Size
128KB
-
MD5
287e702af9d0a3d807837a6f8a068b00
-
SHA1
67d6060479b97468722aa1fe81b8e5a87675f9db
-
SHA256
bd04d967e4ae68389966795ce98735c3c3f12c2a85779f38965d1a3c1efd7be4
-
SHA512
603ad5f634dd00fd1f4f46881e0bc5c892993f7e35bc222bbececd6a6dbdb269700f4b07e2979200905dbd5d845130c4edbbab761fb80e85b9c8defd6e20c7fc
-
SSDEEP
3072:vLWCSycT0Mh9PZGQ0+RXmxCP0qeEo67EEJJI0V9isI21:yCSycYMLPQygIQEo4LJe699
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
bd04d967e4ae68389966795ce98735c3c3f12c2a85779f38965d1a3c1efd7be4.exe windows x86
4abf421bd94c2dfcd6e81d87c397a61c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
SetUnhandledExceptionFilter
ExpandEnvironmentStringsA
CreateDirectoryA
GetModuleFileNameA
OutputDebugStringA
GetWindowsDirectoryA
GetSystemDirectoryA
GetFileAttributesA
SetLastError
lstrcmpiA
lstrcpyA
GetTempPathA
GetTickCount
FindResourceA
HeapFree
LoadResource
CreateFileA
SizeofResource
WriteFile
lstrlenA
FreeResource
MoveFileA
SetFileAttributesA
DeleteFileA
GetCurrentProcess
CloseHandle
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
lstrcatA
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
GetStartupInfoA
user32
GetInputState
PostThreadMessageA
wsprintfA
GetMessageA
advapi32
LookupAccountNameA
RegRestoreKeyA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetUserNameA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
AddAce
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
RegCreateKeyA
StartServiceA
OpenServiceA
RegSaveKeyA
msvcrt
exit
_controlfp
_except_handler3
strchr
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
_vsnprintf
??1type_info@@UAE@XZ
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
netapi32
NetUserGetLocalGroups
NetApiBufferFree
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ