Behavioral task
behavioral1
Sample
a52ece393ba3f408c39a2c1daba575cb87c7e54ca3b4aaf384217e7a36bced27.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a52ece393ba3f408c39a2c1daba575cb87c7e54ca3b4aaf384217e7a36bced27.exe
Resource
win10v2004-20220812-en
General
-
Target
a52ece393ba3f408c39a2c1daba575cb87c7e54ca3b4aaf384217e7a36bced27
-
Size
24KB
-
MD5
4e795bab8d2d03901acd3617cbe26c9b
-
SHA1
5de7df96d5b8bcfdb4d6b52acb716b294feb0fe5
-
SHA256
a52ece393ba3f408c39a2c1daba575cb87c7e54ca3b4aaf384217e7a36bced27
-
SHA512
ba593172148e89035d552ead38a4e34454ae0dca36edca6beaafbe8c84ec1ff1ae3257f3dc07d068301b5fc30dfd2ce7869966480e8c3b75fc90e68f536d1a16
-
SSDEEP
384:abXC8SN04eMSIJpZcN39w+Vd61b8VkgUZ5GSWcMZMuVmrys2EACV6I19QGcV:abS8SN01KpZuy+Vd8b8V8xYMuG2EYGcV
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
a52ece393ba3f408c39a2c1daba575cb87c7e54ca3b4aaf384217e7a36bced27.exe windows x86
edb444f7f05f8064290814c46ab54510
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WritePrivateProfileStringA
CreateDirectoryA
GetFileAttributesA
SetUnhandledExceptionFilter
Sleep
GetPrivateProfileStringA
CreateMutexA
GetCommandLineA
GetCurrentThreadId
GetStartupInfoA
GetModuleFileNameA
SetFilePointer
ReadFile
GetLastError
GetModuleHandleA
GetWindowsDirectoryA
SetLastError
lstrcpyA
GetTempPathA
ExitProcess
GetTickCount
FindResourceA
LoadResource
CreateFileA
GetSystemDirectoryA
lstrcatA
FindFirstFileA
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
lstrlenA
FreeResource
MoveFileA
DeleteFileA
OutputDebugStringA
GetCurrentProcess
lstrcmpiA
CloseHandle
ReleaseMutex
user32
wsprintfA
PostThreadMessageA
GetMessageA
MessageBoxA
GetInputState
advapi32
RegCloseKey
OpenServiceA
StartServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegCreateKeyA
RegOpenKeyExA
RegSaveKeyA
RegCreateKeyExA
RegRestoreKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegDeleteKeyA
msvcrt
exit
_controlfp
??2@YAPAXI@Z
_except_handler3
__CxxFrameHandler
??3@YAXPAX@Z
realloc
malloc
rand
strchr
strstr
??1type_info@@UAE@XZ
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ