Behavioral task
behavioral1
Sample
c6192e57615a5390b5dd121dd3391b60dabe7b6ddd6ca591afce28df19c78516.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6192e57615a5390b5dd121dd3391b60dabe7b6ddd6ca591afce28df19c78516.exe
Resource
win10v2004-20221111-en
General
-
Target
c6192e57615a5390b5dd121dd3391b60dabe7b6ddd6ca591afce28df19c78516
-
Size
115KB
-
MD5
494dd9258ddce3b2da3512887c22dbb7
-
SHA1
27aba7768a687f046c151d0949fc604d9f82908b
-
SHA256
c6192e57615a5390b5dd121dd3391b60dabe7b6ddd6ca591afce28df19c78516
-
SHA512
4d6fa84593258fad68a797af9db8fe4d90e31045052c9e7d1fa766890c171ce53dff70db384e8859da14cae59f5a13c7c34e25705db8086eb5b361d4295f649a
-
SSDEEP
3072:QhrYaNl/R58Y/AxMkJwbe/zhysDvWRIkJl9:Qht8QASkG4zEwvAIkJH
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
c6192e57615a5390b5dd121dd3391b60dabe7b6ddd6ca591afce28df19c78516.exe windows x86
e30a75aaf1901f152ffe985e028bf643
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateThread
PeekNamedPipe
WaitForMultipleObjects
LocalSize
DeviceIoControl
GlobalMemoryStatus
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
Process32First
lstrcmpiA
Process32Next
GetCurrentThreadId
GetModuleHandleA
lstrcmpA
TerminateProcess
GetLocalTime
MultiByteToWideChar
InitializeCriticalSection
LeaveCriticalSection
CreateThread
OpenProcess
GetCurrentProcess
GetVersionExA
Beep
GetModuleFileNameA
GetTickCount
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateEventA
CreateDirectoryA
GetLastError
DeleteFileA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
EnterCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
ResumeThread
LoadLibraryA
GetProcAddress
CloseHandle
OutputDebugStringA
user32
ExitWindowsEx
MessageBoxA
GetWindowTextA
GetAsyncKeyState
GetKeyState
EnumWindows
GetSystemMetrics
GetClassNameA
GetWindowLongA
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
mouse_event
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
GetForegroundWindow
EmptyClipboard
SendMessageA
GetClipboardData
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
IsWindowVisible
CloseDesktop
SetThreadDesktop
OpenInputDesktop
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
DispatchMessageA
GetWindowRect
MoveWindow
FindWindowA
OpenClipboard
TranslateMessage
SwapMouseButton
GetMessageA
CharNextA
wsprintfA
SetClipboardData
ShowWindow
gdi32
DeleteDC
GetDIBits
CreateCompatibleDC
CreateDIBSection
CreateCompatibleBitmap
DeleteObject
BitBlt
SelectObject
advapi32
RegSetValueExA
StartServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
QueryServiceConfigA
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
EnumServicesStatusA
OpenSCManagerA
shell32
Shell_NotifyIconA
SHGetFileInfoA
msvcrt
_beginthreadex
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
memcpy
exit
realloc
strncat
_mbsupr
_mbsstr
wcscpy
_errno
strchr
strncmp
atoi
rename
strncpy
strrchr
_except_handler3
malloc
free
_CxxThrowException
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
winmm
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInClose
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
mciSendStringA
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveInPrepareHeader
waveInAddBuffer
ws2_32
WSACleanup
WSAStartup
gethostname
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
select
setsockopt
connect
htons
closesocket
recv
ntohs
socket
gethostbyname
WSAIoctl
netapi32
NetLocalGroupAddMembers
NetUserAdd
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrame
psapi
EnumProcessModules
GetModuleFileNameExA
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ