Behavioral task
behavioral1
Sample
a8f3b9c63d76ec14bebaa8943cfca18d95d1b02cdb02d1385b0608945c0f9a41.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a8f3b9c63d76ec14bebaa8943cfca18d95d1b02cdb02d1385b0608945c0f9a41.exe
Resource
win10v2004-20220901-en
General
-
Target
a8f3b9c63d76ec14bebaa8943cfca18d95d1b02cdb02d1385b0608945c0f9a41
-
Size
1.1MB
-
MD5
c18d73530085f94dbb4f93d3fd77829f
-
SHA1
4dc2f92c2ea7588ccc826749f2f595cb7d37ddb9
-
SHA256
a8f3b9c63d76ec14bebaa8943cfca18d95d1b02cdb02d1385b0608945c0f9a41
-
SHA512
0dc69702ef5b52bc774629ea024a25ef48980995c349774e96abfc31a215700e305d1fae02ddc16854d4432424259f5117f7ddd36484be2704ca040b90a038d3
-
SSDEEP
24576:wmVQQxfnr+TK7r79/ZUuPANAXSqM5VR4mG10/CA:wp4mGoCA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
a8f3b9c63d76ec14bebaa8943cfca18d95d1b02cdb02d1385b0608945c0f9a41.exe windows x86
e23df118afd94802f3b09811864e68f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcAddress
LoadLibraryA
LeaveCriticalSection
WideCharToMultiByte
ResetEvent
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
lstrcmpA
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
OutputDebugStringA
GetModuleFileNameA
GetStartupInfoA
OpenProcess
Process32Next
RaiseException
GetModuleHandleA
GetLastError
msvcrt
memmove
ceil
_ftol
strstr
_purecall
strchr
malloc
free
_except_handler3
strrchr
exit
atoi
strncmp
strncpy
_errno
wcscpy
strncat
_beginthreadex
sprintf
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
_strnicmp
_strcmpi
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memcpy
??1type_info@@UAE@XZ
Sections
0 Size: 412KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 476KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
6 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
7 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE