Behavioral task
behavioral1
Sample
5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
��Խ��~1.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
��Խ��~1.exe
Resource
win10v2004-20221111-en
General
-
Target
ac6fe3c77aabdd64d66eedfe2e5001b4eb913c7a0d1df525fc5e744b3adafb38
-
Size
567KB
-
MD5
ebec9db15f9f32b55b1aa912dca43e5e
-
SHA1
d8466c2fbb577727938ed2225be24a5f28b9c0a3
-
SHA256
ac6fe3c77aabdd64d66eedfe2e5001b4eb913c7a0d1df525fc5e744b3adafb38
-
SHA512
084434d061c50ad8630994a25553b35ca56b7ad88434ac2c1cc074ca8bea27a473b16db4795c77f5445388b19a35b2ed19e701e0e69a854f53ebc40c02323566
-
SSDEEP
12288:K1/TZTNvYYizXf1yN7+/ttlPs048T0oea9hZClS9it:K1bRNBizv147STlU0rt3ZClS9c
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule static1/unpack001/5.exe family_gh0strat -
Gh0strat family
Files
-
ac6fe3c77aabdd64d66eedfe2e5001b4eb913c7a0d1df525fc5e744b3adafb38.cab
-
5.exe.exe windows x86
c35f073d3a366dcfd6cfdeb7256ba868
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
Process32Next
GetTempPathA
Process32First
CreateToolhelp32Snapshot
SetFileAttributesA
DeleteFileA
CopyFileA
CreateDirectoryA
MoveFileA
CreateFileA
SetUnhandledExceptionFilter
Sleep
ReleaseMutex
CreateMutexA
GetCommandLineA
CreateThread
GetCurrentThreadId
GetStartupInfoA
GetModuleHandleA
SetFilePointer
ReadFile
GetSystemDirectoryA
lstrcatA
GetLastError
SetLastError
GetProcAddress
lstrcmpiA
lstrcpyA
LoadResource
SetFileTime
SizeofResource
WriteFile
lstrlenA
CloseHandle
FreeResource
ExitProcess
GetWindowsDirectoryA
LoadLibraryA
GetFileAttributesA
user32
GetMessageA
wsprintfA
GetInputState
PostThreadMessageA
advapi32
OpenSCManagerA
OpenServiceA
StartServiceA
CreateServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
shell32
ShellExecuteA
msvcrt
??1type_info@@UAE@XZ
_controlfp
strtok
??2@YAPAXI@Z
strchr
__CxxFrameHandler
_CxxThrowException
realloc
malloc
_except_handler3
??3@YAXPAX@Z
fclose
fputs
fopen
strstr
_strcmpi
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
��Խ��~1.EXE.exe windows x86
9165ea3e914e03bda3346f13edbd6ccd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
WriteFile
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetStringTypeA
LCMapStringW
LCMapStringA
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeW
user32
MessageBoxA
wsprintfA
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ