Behavioral task
behavioral1
Sample
f21bfc6660cd64adc45eda10613e5c705273ad7bb6099dad5c4eefa5012c9b6a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f21bfc6660cd64adc45eda10613e5c705273ad7bb6099dad5c4eefa5012c9b6a.exe
Resource
win10v2004-20220812-en
General
-
Target
f21bfc6660cd64adc45eda10613e5c705273ad7bb6099dad5c4eefa5012c9b6a
-
Size
492KB
-
MD5
323601ea013a93514856cb43a58030b4
-
SHA1
53263b5e5122881756b597e58d90b713ad61e16c
-
SHA256
f21bfc6660cd64adc45eda10613e5c705273ad7bb6099dad5c4eefa5012c9b6a
-
SHA512
6f170cd2dd8b22bc76a05eb591356ae813399f1414d23f129849eadd68a01f830d791e6db86d50d8c1c4a0cbf72edefd5064e28f59ada692841301d8ac8f4b48
-
SSDEEP
6144:o4RFDmLzNZVazYloL8cKCXTq7drxfBr5h1MmUdKrw2Rnh5Esym2E87RzYQR0jXH7:FRFDmH3VHFF3MmUiweh5EsyY8dzPML
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
f21bfc6660cd64adc45eda10613e5c705273ad7bb6099dad5c4eefa5012c9b6a.exe windows x86
74f49bbc96b9778e3e15c256504f65af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
RaiseException
GetACP
GetTimeZoneInformation
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
MulDiv
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetDriveTypeA
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
GetFullPathNameA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetFileTime
GetFileAttributesA
lstrcpynA
FindNextFileA
lstrcpyA
FindFirstFileA
GetLastError
SetLastError
FindClose
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
WaitForSingleObject
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameA
WinExec
GlobalLock
GlobalUnlock
GlobalAlloc
GlobalFree
GetVolumeInformationA
Sleep
GetCurrentDirectoryA
FindResourceA
LoadResource
LockResource
GetTempPathA
DeleteFileA
SizeofResource
WriteFile
LoadLibraryA
FreeLibrary
CreateFileA
CloseHandle
GetFileSize
ReadFile
user32
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
CopyRect
TabbedTextOutA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
CharUpperA
wsprintfA
SetFocus
UnhookWindowsHookEx
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GetTopWindow
ShowWindow
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
EnableWindow
LoadIconA
SetForegroundWindow
UnregisterClassA
gdi32
GetDeviceCaps
PtVisible
TextOutA
ExtTextOutA
Escape
DeleteObject
RectVisible
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
comctl32
ord17
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 332KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ