Behavioral task
behavioral1
Sample
bc678bc744628cdbd0a790646a6fb0d778c3d4974578303ff864e22b5030dbff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc678bc744628cdbd0a790646a6fb0d778c3d4974578303ff864e22b5030dbff.exe
Resource
win10v2004-20221111-en
General
-
Target
bc678bc744628cdbd0a790646a6fb0d778c3d4974578303ff864e22b5030dbff
-
Size
116KB
-
MD5
696b6fe9fe775b6f664c3b6e000edb04
-
SHA1
6c52363a77caabb7b83d07c34fca3f0a30a51cd4
-
SHA256
bc678bc744628cdbd0a790646a6fb0d778c3d4974578303ff864e22b5030dbff
-
SHA512
2cf3f7e0e1b8df3b012fa349817ef21f589439a49cdaac3073588b48f1d4547474fb382f4f54e6ceb4f07345a12fd160c0364b0a6538d3e85514fe945bc280fc
-
SSDEEP
1536:BE3i8XCQUtNf9N2UYcUIUfCM0uAz3WRYVks5IeZ+R:qyFQ4NfmUYjIGCM0uA7Vks5IeZ+R
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
bc678bc744628cdbd0a790646a6fb0d778c3d4974578303ff864e22b5030dbff.exe windows x86
b959f76d0ead5395e6c0aa56bbaaa544
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
CloseHandle
EnterCriticalSection
VirtualAlloc
lstrlenA
CreateEventA
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
Sleep
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
CreateDirectoryA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
LocalFree
LocalAlloc
RemoveDirectoryA
CreateFileA
WriteFile
WritePrivateProfileStringA
GetModuleFileNameA
CreateThread
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WinExec
ExitProcess
SetFilePointer
GetLocalTime
GlobalFree
GlobalUnlock
GlobalSize
GetTickCount
CreatePipe
DisconnectNamedPipe
CreateMutexA
GetLastError
RaiseException
GetStartupInfoA
GetModuleHandleA
msvfw32
ICSendMessage
msvcrt
__CxxFrameHandler
memmove
ceil
_ftol
strstr
strchr
malloc
free
_except_handler3
strrchr
rename
atoi
strncmp
strncpy
_errno
_snprintf
_beginthreadex
calloc
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
??0exception@@QAE@ABQBD@Z
_strnicmp
_strupr
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
??1exception@@UAE@XZ
??1type_info@@UAE@XZ
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ujyhkuy Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ