Behavioral task
behavioral1
Sample
bb3121fb046d0d48c80d9cc9f7d38d499b8fb323cc3d0b8e8a1194e8dfab0438.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb3121fb046d0d48c80d9cc9f7d38d499b8fb323cc3d0b8e8a1194e8dfab0438.exe
Resource
win10v2004-20220901-en
General
-
Target
bb3121fb046d0d48c80d9cc9f7d38d499b8fb323cc3d0b8e8a1194e8dfab0438
-
Size
121KB
-
MD5
2703e568b85146674656897467a99a20
-
SHA1
600e2e825b8deca1e53acbf049c89a018a2149cf
-
SHA256
bb3121fb046d0d48c80d9cc9f7d38d499b8fb323cc3d0b8e8a1194e8dfab0438
-
SHA512
f9de939250ec91fdb5f0d75a0607d73c546bd6629af89ae43796ea827f94d9075652e2d4d39bb4fe995167bfa14d9798b7dfca28f57d0ddf846895e9810d0a0d
-
SSDEEP
3072:H2E2PZbBtT5jIb8B2X1lxE74P0LUDfJ/vhI:WV7h5YM4yQvC
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
bb3121fb046d0d48c80d9cc9f7d38d499b8fb323cc3d0b8e8a1194e8dfab0438.exe windows x86
314d1873150bf730030cbd944315eaf8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalSize
OutputDebugStringA
ReleaseMutex
OpenEventA
SetErrorMode
GetStartupInfoA
GetModuleHandleA
RaiseException
LocalAlloc
DeviceIoControl
GetVersion
GetCurrentProcess
ExitProcess
GetLastError
GetModuleFileNameA
SetFilePointer
ReadFile
WriteFile
CreateFileA
RemoveDirectoryA
GlobalFree
GetDiskFreeSpaceExA
GetDriveTypeA
CreateDirectoryA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
GetProcAddress
CancelIo
InterlockedExchange
SetEvent
lstrcpyA
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
DeleteFileA
MoveFileA
TerminateThread
GetVolumeInformationA
lstrcatA
user32
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
LoadCursorA
DestroyCursor
SystemParametersInfoA
SendMessageA
ReleaseDC
SetCursorPos
GetDesktopWindow
SetRect
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindow
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
ExitWindowsEx
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
GetDC
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
EnumWindows
gdi32
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
RegSetValueExA
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
IsValidSid
shell32
SHGetFileInfoA
msvcrt
exit
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
calloc
_beginthreadex
strncat
wcscpy
_errno
strncmp
atoi
strncpy
rename
strrchr
_except_handler3
free
malloc
strchr
strstr
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
ws2_32
listen
accept
getpeername
sendto
getsockname
inet_addr
send
recvfrom
__WSAFDIsSet
gethostname
bind
select
closesocket
recv
ntohs
socket
gethostbyname
WSAStartup
WSACleanup
WSAIoctl
htons
connect
setsockopt
inet_ntoa
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
NetLocalGroupAddMembers
NetUserAdd
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ