Behavioral task
behavioral1
Sample
ade1c44d69272ddbb8970442b6e065cf5edd47f68c9ce1d6aa42cafcf8b6920b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ade1c44d69272ddbb8970442b6e065cf5edd47f68c9ce1d6aa42cafcf8b6920b.exe
Resource
win10v2004-20220901-en
General
-
Target
ade1c44d69272ddbb8970442b6e065cf5edd47f68c9ce1d6aa42cafcf8b6920b
-
Size
555KB
-
MD5
822fccb6780ad1869db59c5859d7a935
-
SHA1
6534662fed962a7726a9a8c319ccfbfb01ff9136
-
SHA256
ade1c44d69272ddbb8970442b6e065cf5edd47f68c9ce1d6aa42cafcf8b6920b
-
SHA512
cc8c19cf4de1f2e1004513ef0ed8c628ebc93585eb60d89b1da71639916b8794a4c37369158e218516b5f246b16e58cb447df2f3e7691d5fb75f05ce56da11fb
-
SSDEEP
12288:Wv/gE58qVdiuir+TB44zeWf0l+Kmi5zCAQHM5xyT3JK:WJ6qVdiuir+TB44zd0wKmwCAQHM5UT3
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
ade1c44d69272ddbb8970442b6e065cf5edd47f68c9ce1d6aa42cafcf8b6920b.exe windows x86
11dc97522cdc0de1cc494dba26794844
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
LocalSize
MultiByteToWideChar
OpenProcess
LoadLibraryW
HeapFree
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetModuleHandleW
GetSystemInfo
GetVersionExA
GetModuleFileNameA
OpenEventW
SetErrorMode
GetComputerNameA
CreateMutexA
ExitProcess
GetCurrentThreadId
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
WaitForMultipleObjects
PeekNamedPipe
lstrcpyW
MoveFileExA
GetTempPathA
GetWindowsDirectoryA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualProtect
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
LoadLibraryA
GetProcAddress
FreeLibrary
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
lstrlenA
lstrcatA
WideCharToMultiByte
CreateThread
ResumeThread
Sleep
SetEvent
WaitForSingleObject
SetEndOfFile
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
InterlockedIncrement
InterlockedDecrement
HeapSize
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
SetUnhandledExceptionFilter
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
GetModuleHandleA
HeapReAlloc
RaiseException
RtlUnwind
TerminateThread
CloseHandle
CreateEventW
advapi32
RegOpenKeyExA
RegQueryValueExA
RegQueryValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
StartServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
QueryServiceStatus
ControlService
DeleteService
OpenSCManagerW
EnumServicesStatusA
OpenServiceA
QueryServiceConfigA
CloseServiceHandle
RegCreateKeyA
RegEnumValueA
RegQueryInfoKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegCloseKey
user32
SystemParametersInfoA
keybd_event
MapVirtualKeyA
wsprintfA
CreateDialogParamA
BlockInput
ShowWindow
SetWindowPos
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
CharNextA
DestroyCursor
UpdateWindow
IsWindow
SendMessageA
GetClientRect
CloseWindow
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
OpenDesktopA
LoadCursorA
GetThreadDesktop
GetUserObjectInformationA
CloseDesktop
ExitWindowsEx
FindWindowW
GetClassNameA
GetWindowTextA
IsWindowVisible
GetWindowThreadProcessId
MessageBoxW
GetInputState
PostThreadMessageA
wsprintfW
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
EndDialog
shell32
ShellExecuteA
SHGetFileInfoA
psapi
EnumProcessModules
GetModuleFileNameExA
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
winmm
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveInReset
waveInUnprepareHeader
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
oleaut32
SysFreeString
netapi32
NetUserEnum
NetLocalGroupAddMembers
NetUserAdd
NetUserDel
NetApiBufferFree
shlwapi
PathRemoveFileSpecA
SHDeleteKeyA
avicap32
capCreateCaptureWindowW
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrameStart
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrame
Sections
.text Size: 466KB - Virtual size: 466KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ