Behavioral task
behavioral1
Sample
a3b6e4d111d3b3b245c72ec099b48ff4d48f6f997de9f4bfa368289cc1afaefb.exe
Resource
win7-20220812-en
General
-
Target
a3b6e4d111d3b3b245c72ec099b48ff4d48f6f997de9f4bfa368289cc1afaefb
-
Size
232KB
-
MD5
f829c9ab50fd07a221e2c770101da8e2
-
SHA1
be862b2349f7def9aceb085761435896b86c1313
-
SHA256
a3b6e4d111d3b3b245c72ec099b48ff4d48f6f997de9f4bfa368289cc1afaefb
-
SHA512
9e6d14426a9e179053f8c724198661c80028e99ed1bf85986787b9ff093c06b16d897e2a1ac920210211e82bb79d3dfd548bbdd90ad8fa2a7b01f593d8cdce4e
-
SSDEEP
3072:lnqovwZSQpKa3VGVnpUlCz764/9xpEEBqbZuw25iGa+44CIBXVUHHmWSD+WmAwD/:lnqoaJVGpxx9b3wZuw24Gu4CkFeS0
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
a3b6e4d111d3b3b245c72ec099b48ff4d48f6f997de9f4bfa368289cc1afaefb.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
nsp0 Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nsp1 Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.server Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE