Behavioral task
behavioral1
Sample
6a2a133e72dbad9e32a093e3023e77b1033476bad427f7019eeda34cd9fcfd31.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a2a133e72dbad9e32a093e3023e77b1033476bad427f7019eeda34cd9fcfd31.exe
Resource
win10v2004-20221111-en
General
-
Target
6a2a133e72dbad9e32a093e3023e77b1033476bad427f7019eeda34cd9fcfd31
-
Size
159KB
-
MD5
7fdacfac7836f547be88eb24dd98e4ac
-
SHA1
6d892007bb968de7cb792e54d2457c44bbf850ed
-
SHA256
6a2a133e72dbad9e32a093e3023e77b1033476bad427f7019eeda34cd9fcfd31
-
SHA512
2a35e225bc47b3e354d412eff024d6b553f62801e5443796d1f6187082a832ff180e11240bdb54ab585e3b91450465558dcc4f36a0e430b7ad27d3f49b67f7d1
-
SSDEEP
3072:SP6gWKyIp/B8T0oInNobfhIBuWDTtaZOb72K1mzYCgZwusbeqov:Sz8TqNobpIA0tyM2xzYJ65eqo
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
6a2a133e72dbad9e32a093e3023e77b1033476bad427f7019eeda34cd9fcfd31.exe windows x86
30173667f873ae3a460033a3639ab659
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
CreateEventA
GetModuleHandleA
WaitForSingleObject
Sleep
CloseHandle
GetTickCount
GetStartupInfoA
user32
LoadIconA
RegisterClassA
LoadCursorA
gdi32
GetStockObject
advapi32
StartServiceA
ControlService
RegCreateKeyExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
OpenServiceA
OpenSCManagerA
ChangeServiceConfigA
msvcrt
sprintf
rand
srand
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ