Behavioral task
behavioral1
Sample
aa8d6c51236f9b97959a8e963d4573c6cb41ceff9532ab3cc5ad18d70c5ddeb6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aa8d6c51236f9b97959a8e963d4573c6cb41ceff9532ab3cc5ad18d70c5ddeb6.exe
Resource
win10v2004-20221111-en
General
-
Target
aa8d6c51236f9b97959a8e963d4573c6cb41ceff9532ab3cc5ad18d70c5ddeb6
-
Size
108KB
-
MD5
0e1ccb59daeffd4c3f95f265f0fc2c3c
-
SHA1
a898f0b55a807a4a963fbb74457041134d987790
-
SHA256
aa8d6c51236f9b97959a8e963d4573c6cb41ceff9532ab3cc5ad18d70c5ddeb6
-
SHA512
087796f8a48cd9caf0de1a1a21b38fb0f2223103241997ffdba16c58eb8e86238654b9bd1935bdfb9ce8d02eecf625e3a24b3e58e7567947d00aa106daad95c0
-
SSDEEP
3072:nEDp5IucmVVLVTuoKem/1EQ6vEpvHa3Ha16nzJ:nyp5IucmVVLVxj6HTpf716F
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
aa8d6c51236f9b97959a8e963d4573c6cb41ceff9532ab3cc5ad18d70c5ddeb6.exe windows x86
f09e12d8219868fcb9d8e18a7b029461
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
GetLocalTime
GetFileAttributesA
ReadFile
SetFilePointer
SetUnhandledExceptionFilter
Sleep
ReleaseMutex
CopyFileA
GetCommandLineA
SetFileAttributesA
CreateDirectoryA
GetSystemDirectoryA
GetCurrentThreadId
GetStartupInfoA
GetModuleHandleA
WinExec
GetModuleFileNameA
lstrcmpA
DeleteFileA
SetLastError
lstrcmpiA
lstrcpyA
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
FreeLibrary
SetFileTime
SizeofResource
lstrlenA
WriteFile
CloseHandle
MultiByteToWideChar
ExitProcess
lstrcatA
GetLastError
GetTempPathA
GetProcessHeap
GetWindowsDirectoryA
HeapAlloc
HeapFree
LoadLibraryA
GetProcAddress
CreateMutexA
user32
GetMessageA
wsprintfA
GetInputState
PostThreadMessageA
advapi32
InitializeSecurityDescriptor
CreateServiceA
CloseServiceHandle
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
StartServiceA
OpenServiceA
OpenSCManagerA
msvcrt
_exit
_except_handler3
realloc
malloc
strlen
strchr
memset
strtok
??2@YAPAXI@Z
memcpy
exit
__CxxFrameHandler
_CxxThrowException
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
_strrev
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ