Behavioral task
behavioral1
Sample
bbb11634b4579843d24dff32465e4e2fa4326c1c6cc034fea3fe427c442a351a.exe
Resource
win7-20220901-en
General
-
Target
bbb11634b4579843d24dff32465e4e2fa4326c1c6cc034fea3fe427c442a351a
-
Size
172KB
-
MD5
9d9c7294637e7c1271b8dc5b6c3b2f4f
-
SHA1
6914a5f469d822152006376e6993cb2ed3e693b4
-
SHA256
bbb11634b4579843d24dff32465e4e2fa4326c1c6cc034fea3fe427c442a351a
-
SHA512
b5aaad7682b7bffe88fbf65db10d75d279294cdadf060e621020bc5b84db57d940b20bc524ca9046acb0dcd7df14fd7bbab4bffe443a1fcc6d7b4aff33d36b60
-
SSDEEP
3072:1zHvDrLnJaev/qCyntNryJ7zmMTmhrR8smUo10TY6SLSw3M7ESxdzR:RvftZCCyW1KJD8z7n6SWw3M7n
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
bbb11634b4579843d24dff32465e4e2fa4326c1c6cc034fea3fe427c442a351a.exe windows x86
ca3cea1858131de1be21ad0065c0d492
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalLock
GlobalReAlloc
GlobalAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleHandleA
GlobalDeleteAtom
TlsAlloc
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
WriteFile
RtlUnwind
HeapReAlloc
HeapAlloc
RaiseException
GetStartupInfoA
HeapFree
HeapSize
TerminateProcess
GetACP
VirtualFree
VirtualAlloc
IsBadWritePtr
GetVersionExA
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
InitializeCriticalSection
LocalFree
LocalAlloc
lstrcpynA
GetCurrentThreadId
WinExec
GetCommandLineA
CreateMutexA
ReleaseMutex
Sleep
SetUnhandledExceptionFilter
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
WideCharToMultiByte
SetFilePointer
ReadFile
SetLastError
lstrcmpiA
GetTempPathA
GetTickCount
LoadResource
SetFileTime
SizeofResource
lstrlenA
MoveFileA
MultiByteToWideChar
GetVersion
CreateRemoteThread
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
ExitProcess
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetWindowsDirectoryA
MoveFileExA
CopyFileA
DeleteFileA
GetCurrentProcess
lstrcatA
GetLastError
FreeLibrary
LoadLibraryA
GlobalFindAtomA
GetProcAddress
user32
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
LoadStringA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
GetInputState
wsprintfA
GetMessageA
PostThreadMessageA
IsWindowEnabled
advapi32
RegQueryValueExA
GetUserNameA
CreateServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
ControlService
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
comctl32
ord17
netapi32
NetUserGetLocalGroups
NetApiBufferFree
gdi32
GetClipBox
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
CreateBitmap
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
SaveDC
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
Sections
.asdasda Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 56KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ