Behavioral task
behavioral1
Sample
47a7c5d2ca0822ddc29b3873a0765ec63cd8c16738be2124fd2d6a1ba9e4b8b5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
47a7c5d2ca0822ddc29b3873a0765ec63cd8c16738be2124fd2d6a1ba9e4b8b5.exe
Resource
win10v2004-20220812-en
General
-
Target
47a7c5d2ca0822ddc29b3873a0765ec63cd8c16738be2124fd2d6a1ba9e4b8b5
-
Size
204KB
-
MD5
fda0790b69830889b553a34c0498f9b2
-
SHA1
5f25e75bc682b5f8d3e16cf75812224e1d0bbcfd
-
SHA256
47a7c5d2ca0822ddc29b3873a0765ec63cd8c16738be2124fd2d6a1ba9e4b8b5
-
SHA512
255aa63a1e90fd332452085eb28e2d8359ead75cb628dae914d0f96bd4edfab7dd9c549bf3dae3bd3ea5a71c940afae6269627a4193f18ae1b6446f87e968cfb
-
SSDEEP
6144:USt1Febl8qPzJNK8/KINFBJNYtGucHdOLv8pgki:UStKbl8mJWMFzNYtksj8yki
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
47a7c5d2ca0822ddc29b3873a0765ec63cd8c16738be2124fd2d6a1ba9e4b8b5.exe windows x86
a6532440cceaf03a0f074669e7758bf4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
InterlockedExchange
CancelIo
GetLastError
ResetEvent
GetPrivateProfileSectionNamesA
GetWindowsDirectoryA
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileStringA
LocalAlloc
CreateProcessA
lstrcpyA
TerminateThread
DeleteFileA
lstrcatA
OutputDebugStringA
Thread32Next
SuspendThread
VirtualAlloc
Thread32First
CreateToolhelp32Snapshot
ResumeThread
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
WinExec
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
OpenProcess
Process32Next
Process32First
lstrcmpiA
GetCurrentThreadId
GetStartupInfoA
GetModuleHandleA
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
GetTickCount
SetErrorMode
OpenEventA
Sleep
CloseHandle
GetProcAddress
WaitForSingleObject
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetDriveTypeA
GetDiskFreeSpaceExA
lstrlenA
GlobalMemoryStatusEx
FreeLibrary
LoadLibraryA
OpenThread
user32
LoadCursorA
wsprintfA
IsWindow
SetRect
GetDC
ReleaseDC
DestroyCursor
GetCursorInfo
SendMessageA
GetWindowTextA
GetWindow
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
OpenDesktopA
SetThreadDesktop
CloseDesktop
FindWindowExA
GetClassNameA
GetWindowThreadProcessId
GetDesktopWindow
advapi32
OpenEventLogA
RegQueryValueExA
RegOpenKeyExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
CloseEventLog
ClearEventLogA
CloseServiceHandle
DeleteService
OpenSCManagerA
RegEnumKeyExA
RegQueryInfoKeyA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegCloseKey
shell32
SHGetFileInfoA
SHFileOperationA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
msvcrt
printf
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
??2@YAPAXI@Z
putchar
??3@YAXPAX@Z
__CxxFrameHandler
atol
atoi
strncpy
strstr
memmove
ceil
_ftol
puts
_CxxThrowException
strchr
malloc
free
_mbscmp
_except_handler3
strrchr
sprintf
getchar
_strrev
_mbsicmp
_beginthreadex
ws2_32
htons
socket
WSAIoctl
send
setsockopt
closesocket
select
recv
WSAStartup
gethostname
gethostbyname
getsockname
WSACleanup
msvcp60
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 93KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ