Behavioral task
behavioral1
Sample
68ed42105b90582e8b73f8df64a4eeffbc4fa5f9331f95dfedc5af10ff1201b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68ed42105b90582e8b73f8df64a4eeffbc4fa5f9331f95dfedc5af10ff1201b6.exe
Resource
win10v2004-20221111-en
General
-
Target
68ed42105b90582e8b73f8df64a4eeffbc4fa5f9331f95dfedc5af10ff1201b6
-
Size
587KB
-
MD5
93dcceea43ce357a738dec1665b8d363
-
SHA1
5d58695bc4413e9a21585c7abc2269f1a0da49f5
-
SHA256
68ed42105b90582e8b73f8df64a4eeffbc4fa5f9331f95dfedc5af10ff1201b6
-
SHA512
e4e351607328fd019340fcf5a0c2e40f2157881c721d22172e36f92827aa3ec027480148f50bbdb2dc439730a2f90f3f8cc5202718d8f2883db3c2d95e1df2f6
-
SSDEEP
12288:34ddhJlAghv3r+TsPREfWZRJTUb5XfM5A7pnT:oblAghv3r+TsPREuRlU9fM5ANnT
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
68ed42105b90582e8b73f8df64a4eeffbc4fa5f9331f95dfedc5af10ff1201b6.exe windows x86
fc3c69139cf8d8b6f054ba601b7b7e84
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
kernel32
GetStartupInfoA
OpenProcess
Process32Next
GetLastError
RaiseException
GetModuleHandleA
GetProcAddress
LoadLibraryA
LeaveCriticalSection
WideCharToMultiByte
ResetEvent
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
SetFilePointer
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
WriteFile
CloseHandle
CopyFileA
WinExec
GetModuleFileNameA
GlobalAlloc
GlobalLock
lstrcmpA
GlobalUnlock
user32
CloseWindow
GetClientRect
SendMessageA
GetDlgItem
SetDlgItemTextA
GetDlgItemTextA
SetWindowPos
ShowWindow
UpdateWindow
CreateDialogParamA
EndDialog
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
LoadCursorA
DestroyCursor
BlockInput
SetThreadDesktop
CloseDesktop
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
PostMessageA
OpenDesktopA
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
DispatchMessageA
TranslateMessage
GetMessageA
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
keybd_event
SystemParametersInfoA
CreateWindowExA
GetCursorPos
gdi32
SelectObject
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
GetDIBits
CreateCompatibleBitmap
CreateDIBSection
advapi32
LsaFreeMemory
LookupAccountNameA
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaRetrievePrivateData
LsaOpenPolicy
IsValidSid
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
malloc
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
vsprintf
_beginthreadex
sprintf
strncat
wcscpy
_errno
strncpy
strncmp
atoi
exit
strrchr
_except_handler3
free
??1type_info@@UAE@XZ
strchr
_purecall
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
winmm
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveOutClose
waveOutUnprepareHeader
waveInGetNumDevs
waveInReset
waveInUnprepareHeader
waveInClose
waveOutReset
netapi32
NetLocalGroupAddMembers
NetUserAdd
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 473KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ