Behavioral task
behavioral1
Sample
d24a408a75cae72dd75a79caa17173004c640be62df6953ce5cec021389ab499.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d24a408a75cae72dd75a79caa17173004c640be62df6953ce5cec021389ab499.exe
Resource
win10v2004-20220812-en
General
-
Target
d24a408a75cae72dd75a79caa17173004c640be62df6953ce5cec021389ab499
-
Size
127KB
-
MD5
bf6feff035b022ea14575406867fa618
-
SHA1
fdc8ae604136fc4eb15eecca184cb302c2aa996d
-
SHA256
d24a408a75cae72dd75a79caa17173004c640be62df6953ce5cec021389ab499
-
SHA512
6039af5f387b649ca507fc857de201a33692ad2ec85a6369d73e0df4085b17dbc696984f9ab4c30e08e03ec8db646065821c74a888c511d78e1a7f30158fb2d5
-
SSDEEP
1536:MaBJuFycWBKpf1EBlfW+qcD+pfsPcDbpSh+7Y3BmwNaFEWs9uzU3:MkggKvulfW+qg+psPcDbpSsSNaFlq3
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
d24a408a75cae72dd75a79caa17173004c640be62df6953ce5cec021389ab499.exe windows x86
bb76e9fdae9b871ce034ee6eec46a94d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvfw32
ICSendMessage
kernel32
RaiseException
LocalAlloc
GetProcAddress
LoadLibraryA
CloseHandle
Sleep
GlobalFree
GlobalUnlock
GlobalSize
lstrlenA
FormatMessageA
FreeLibrary
GetStartupInfoA
GetModuleHandleA
GetLastError
InterlockedExchange
msvcrt
_snprintf
_beginthreadex
_ftol
_exit
_strupr
exit
_acmdln
__getmainargs
_errno
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
strncpy
strncmp
atoi
rename
strrchr
_except_handler3
free
malloc
strchr
_initterm
strstr
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
_strnicmp
calloc
_XcptFilter
msvcp60
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
urlmon
URLDownloadToFileA
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ujyhkuy Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ