JustTempFun
Behavioral task
behavioral1
Sample
fab9e3a4a4d12df438a3543b6a0902136daf186776ef8ee7c3ef2d5007ceab0b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fab9e3a4a4d12df438a3543b6a0902136daf186776ef8ee7c3ef2d5007ceab0b.exe
Resource
win10v2004-20220812-en
General
-
Target
fab9e3a4a4d12df438a3543b6a0902136daf186776ef8ee7c3ef2d5007ceab0b
-
Size
224KB
-
MD5
931008fd8601d7e6c50454cb9c382b9f
-
SHA1
a4ecb771cfdcd9134b808aae2a19cdd2556f4e64
-
SHA256
fab9e3a4a4d12df438a3543b6a0902136daf186776ef8ee7c3ef2d5007ceab0b
-
SHA512
7ecdf7b9f4ec7d7d41ecebf2fe7736de680cf9726cd6e976d91178036150926653ad8a415f343431a8f4b21248b1a4d6eb0cfbeca9f108ad25424fb3f4fa324d
-
SSDEEP
6144:lZ8jGFMCGCh1+zZ4iFWW9c8qqFLqqFP3A:lmqFMCGWoZ4iTPqq1qq5w
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
fab9e3a4a4d12df438a3543b6a0902136daf186776ef8ee7c3ef2d5007ceab0b.exe windows x86
369791ae37fc223199ea18c8d221bb9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
LocalSize
OutputDebugStringA
GetStartupInfoA
DisconnectNamedPipe
TerminateProcess
WaitForMultipleObjects
GetSystemInfo
CopyFileA
OpenEventA
SetErrorMode
Process32Next
LocalReAlloc
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
GetLocalTime
GetSystemDirectoryA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
OpenProcess
FindFirstFileA
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetFileAttributesA
LoadLibraryA
GetProcAddress
Sleep
CancelIo
CreateEventA
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
Beep
DeviceIoControl
GetVersion
GetCurrentProcess
LocalAlloc
ExitProcess
PeekNamedPipe
user32
GetKeyState
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
GetAsyncKeyState
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
IsWindow
CloseWindow
CreateWindowExA
DispatchMessageA
GetWindowTextA
SwapMouseButton
SendMessageA
TranslateMessage
GetForegroundWindow
GetWindowRect
MoveWindow
FindWindowA
ShowWindow
ExitWindowsEx
MessageBoxA
GetMessageA
CharNextA
wsprintfA
CloseClipboard
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
GetCursorPos
gdi32
DeleteDC
DeleteObject
GetDIBits
CreateDIBSection
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
advapi32
IsValidSid
LookupAccountNameA
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
RegSetValueExA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
msvcrt
_stricmp
_strnicmp
_controlfp
_strrev
_strcmpi
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
strncat
_snprintf
wcscpy
_errno
strchr
strncmp
atoi
strncpy
strrchr
malloc
free
_except_handler3
_CxxThrowException
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
winmm
waveInPrepareHeader
waveInOpen
waveInAddBuffer
waveOutPrepareHeader
waveInStart
waveOutWrite
waveInStop
waveOutClose
waveOutOpen
waveOutGetNumDevs
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInGetNumDevs
waveInUnprepareHeader
mciSendStringA
waveInReset
ws2_32
WSACleanup
WSAStartup
WSAIoctl
connect
htons
socket
ntohs
recv
closesocket
select
send
gethostname
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
inet_addr
setsockopt
inet_ntoa
gethostbyname
userenv
GetProfilesDirectoryA
GetUserProfileDirectoryA
msvcp60
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
netapi32
NetUserAdd
NetLocalGroupAddMembers
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
avicap32
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrameStart
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrame
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
psapi
GetModuleFileNameExA
Exports
Exports
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ