Behavioral task
behavioral1
Sample
063c88f5c4551f6063d3d4e348972a86f28754406880bd0c3feffabec4862469.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
063c88f5c4551f6063d3d4e348972a86f28754406880bd0c3feffabec4862469.exe
Resource
win10v2004-20220812-en
General
-
Target
063c88f5c4551f6063d3d4e348972a86f28754406880bd0c3feffabec4862469
-
Size
168KB
-
MD5
5319c097001caa2ead3c4248818b479e
-
SHA1
4396551ef75e13a1267472a402bb4e3672f8467b
-
SHA256
063c88f5c4551f6063d3d4e348972a86f28754406880bd0c3feffabec4862469
-
SHA512
5fea7015b0d3b85c1dfa1cde99c6bd3d7a555c1c91e87fffcc226b5f497bbefaeda4aec7203fde2fc4c48bc597cd911e25d317841bb48565a1930ece9994225a
-
SSDEEP
3072:pyr4hTF3hMk5OA7oCyQtoSKhOYP/GPoG7C18cS7DWY6OwPqCOHsu:pbx5P7oCytJEm/B51Jc6OwPqCK
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
063c88f5c4551f6063d3d4e348972a86f28754406880bd0c3feffabec4862469.exe windows x86
2efd6d6a52d01bdd436ee68f247f654f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
CreateThread
Sleep
WinExec
GetCommandLineA
lstrcpynA
LocalAlloc
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalLock
GlobalReAlloc
GlobalAlloc
CreateMutexA
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
WriteFile
RtlUnwind
HeapReAlloc
HeapAlloc
RaiseException
GetStartupInfoA
HeapFree
HeapSize
TerminateProcess
GetACP
VirtualFree
VirtualAlloc
IsBadWritePtr
GetVersionExA
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
ReleaseMutex
SetUnhandledExceptionFilter
GetModuleHandleA
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
WideCharToMultiByte
SetFilePointer
ReadFile
SetLastError
lstrcmpiA
GetTempPathA
GetTickCount
LoadResource
SetFileTime
SizeofResource
lstrlenA
MoveFileA
MultiByteToWideChar
GetVersion
CreateRemoteThread
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
ExitProcess
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetWindowsDirectoryA
MoveFileExA
CopyFileA
DeleteFileA
GetCurrentProcess
lstrcatA
GetLastError
FreeLibrary
LoadLibraryA
EnterCriticalSection
GetProcAddress
user32
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
SetWindowTextA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetSubMenu
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
LoadStringA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
GetMenuItemID
GetDlgItem
GetWindowTextA
GetInputState
PostThreadMessageA
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
GetDlgCtrlID
wsprintfA
DestroyWindow
advapi32
RegQueryValueExA
GetUserNameA
CreateServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
ControlService
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
comctl32
ord17
netapi32
NetUserGetLocalGroups
NetApiBufferFree
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
Sections
.text Size: 66KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gda Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE