Behavioral task
behavioral1
Sample
de7843b97a0733d87a78c0afa64c9160519586083729d3635ef5264011bbdf8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de7843b97a0733d87a78c0afa64c9160519586083729d3635ef5264011bbdf8b.exe
Resource
win10v2004-20220901-en
General
-
Target
de7843b97a0733d87a78c0afa64c9160519586083729d3635ef5264011bbdf8b
-
Size
120KB
-
MD5
5bf252c1221b45f12bf99ca9d0d7f060
-
SHA1
1a79cb3eb8fcb08e4510294bbc2c4e4449fd560b
-
SHA256
de7843b97a0733d87a78c0afa64c9160519586083729d3635ef5264011bbdf8b
-
SHA512
bc20a19d4b2b8a98e7577a1615fbe1e0dab36c7f6f1bc612a2742e140aa15c4489763c62637ee1ff6622b6b75649b0bcad9506b66c8d33a75d8ffb7bf854c6dd
-
SSDEEP
3072:T2E2PZbBtT5jIb8B2X1lxE74P0LUDfJ/vh8:CV7h5YM4yQvC
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
de7843b97a0733d87a78c0afa64c9160519586083729d3635ef5264011bbdf8b.exe windows x86
314d1873150bf730030cbd944315eaf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalSize
OutputDebugStringA
ReleaseMutex
OpenEventA
SetErrorMode
GetStartupInfoA
GetModuleHandleA
RaiseException
LocalAlloc
DeviceIoControl
GetVersion
GetCurrentProcess
ExitProcess
GetLastError
GetModuleFileNameA
SetFilePointer
ReadFile
WriteFile
CreateFileA
RemoveDirectoryA
GlobalFree
GetDiskFreeSpaceExA
GetDriveTypeA
CreateDirectoryA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
GetProcAddress
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
DeleteFileA
MoveFileA
TerminateThread
GetVolumeInformationA
lstrcatA
user32
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
LoadCursorA
DestroyCursor
SystemParametersInfoA
SendMessageA
ReleaseDC
SetCursorPos
GetDesktopWindow
SetRect
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindow
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
ExitWindowsEx
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
GetDC
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
EnumWindows
gdi32
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
RegSetValueExA
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
IsValidSid
shell32
SHGetFileInfoA
msvcrt
exit
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
calloc
_beginthreadex
strncat
wcscpy
_errno
strncmp
atoi
strncpy
rename
strrchr
_except_handler3
free
malloc
strchr
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
ws2_32
listen
accept
getpeername
sendto
getsockname
inet_addr
send
recvfrom
__WSAFDIsSet
gethostname
bind
select
closesocket
recv
ntohs
socket
gethostbyname
WSAStartup
WSACleanup
WSAIoctl
htons
connect
setsockopt
inet_ntoa
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
NetLocalGroupAddMembers
NetUserAdd
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ