Behavioral task
behavioral1
Sample
8ae4faae6292c889e5d259d7261f1b21325e49fad4a07174feb72478488f276a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8ae4faae6292c889e5d259d7261f1b21325e49fad4a07174feb72478488f276a.exe
Resource
win10v2004-20221111-en
General
-
Target
8ae4faae6292c889e5d259d7261f1b21325e49fad4a07174feb72478488f276a
-
Size
216KB
-
MD5
321c5564db3243f2b549f4f71a5192b0
-
SHA1
7a51229082cc41d15e474a17763c26cb02e45e9f
-
SHA256
8ae4faae6292c889e5d259d7261f1b21325e49fad4a07174feb72478488f276a
-
SHA512
e2d117b17acfa81887cb83218cfca9baefb3a3601926710f25b6f6768d562bb0e0f007341b1ce8a8735e4ceb09b31a75cf1d93f3fde9c93b6ab76d8afbb7dd2b
-
SSDEEP
3072:DQ3sbreMlxyZJtOOzmu2Kyigt5rnGkyHklOb6q+LepyPiRm+mLyLbOq+cl7Rhh:DQz+y4O6u2Cgt5TNC9bh6YaiR7mLMb15
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
8ae4faae6292c889e5d259d7261f1b21325e49fad4a07174feb72478488f276a.exe windows x86
7c37c01d86fe333e9b937ec922624f8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetCommandLineA
SetUnhandledExceptionFilter
GetModuleFileNameA
ExpandEnvironmentStringsA
SetLastError
lstrcmpiA
lstrlenA
lstrcpyA
FindResourceA
LoadResource
LockResource
SizeofResource
ExitProcess
LoadLibraryA
lstrcatA
GetLastError
HeapAlloc
GetModuleHandleA
GetProcAddress
HeapFree
RtlUnwind
HeapReAlloc
RaiseException
GetStartupInfoA
GetVersion
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
CloseHandle
WriteFile
TlsSetValue
TlsAlloc
TlsGetValue
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
FlushFileBuffers
SetFilePointer
CreateFileA
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
InterlockedDecrement
InterlockedIncrement
SetEndOfFile
ReadFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
PostThreadMessageA
GetInputState
advapi32
CreateServiceA
CloseServiceHandle
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ