Behavioral task
behavioral1
Sample
a6e0b77f2dce62217274d7ccdebcea08d2170a8c0e62f8f40dcca22cd69154f2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a6e0b77f2dce62217274d7ccdebcea08d2170a8c0e62f8f40dcca22cd69154f2.exe
Resource
win10v2004-20220901-en
General
-
Target
a6e0b77f2dce62217274d7ccdebcea08d2170a8c0e62f8f40dcca22cd69154f2
-
Size
488KB
-
MD5
3726029d159d889e7242afb9b8613c94
-
SHA1
90a8d4ef57830769d2dbd3681f4f6680aead166f
-
SHA256
a6e0b77f2dce62217274d7ccdebcea08d2170a8c0e62f8f40dcca22cd69154f2
-
SHA512
2780ea575c845a6ab53c4d7a8e8674d35f4eb219d0fafd83d4955486bf260b713f2faecfe12a0073fc04bec269e49464bab22a1e049b2f0ce2a7e586ef79f98e
-
SSDEEP
12288:YM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmL:YM5j8Z3aKHx5r+TuxX+IwffFL
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
a6e0b77f2dce62217274d7ccdebcea08d2170a8c0e62f8f40dcca22cd69154f2.exe windows x86
6c4a5fa353f0df1949c4456e6374096e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
OpenProcess
LoadLibraryA
WideCharToMultiByte
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
DeleteFileA
CreateDirectoryA
RaiseException
FreeLibrary
GetModuleHandleA
SetFilePointer
GetVolumeInformationA
FindClose
LocalAlloc
GetVersion
DeviceIoControl
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
CloseHandle
GetLastError
WaitForSingleObject
GlobalUnlock
WriteFile
GetModuleFileNameA
GetProcAddress
SetFileAttributesA
GlobalAlloc
GetFileAttributesA
GlobalLock
user32
EnumWindows
IsWindowVisible
LoadIconA
RegisterClassExA
DefWindowProcA
GetCursorPos
GetCursorInfo
GetDesktopWindow
GetDC
GetSystemMetrics
GetClipboardData
OpenClipboard
CloseClipboard
mouse_event
WindowFromPoint
MapVirtualKeyA
SystemParametersInfoA
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
wsprintfA
CharNextA
EndDialog
CreateDialogParamA
PostMessageA
ShowWindow
SetWindowPos
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
SendMessageA
CloseWindow
CreateWindowExA
GetMessageA
OpenInputDesktop
DispatchMessageA
gdi32
CreateDIBSection
DeleteDC
GetDIBits
CreateCompatibleBitmap
DeleteObject
advapi32
RegCreateKeyExA
LsaClose
RegOpenKeyA
LsaOpenPolicy
RegSetValueExA
RegDeleteKeyA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueA
RegOpenKeyExA
RegCloseKey
LsaFreeMemory
IsValidSid
oleaut32
SysFreeString
msvcrt
strncpy
strncmp
atoi
exit
_errno
wcscpy
strncat
sprintf
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_strnicmp
_strnset
_strcmpi
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memcpy
_beginthreadex
fopen
fwrite
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_purecall
strchr
malloc
free
_except_handler3
strrchr
fclose
??1type_info@@UAE@XZ
winmm
waveOutGetNumDevs
waveOutOpen
waveOutPrepareHeader
waveInGetNumDevs
waveInOpen
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveOutWrite
waveInStop
waveInUnprepareHeader
waveInClose
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveInReset
ws2_32
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
bind
getsockname
inet_addr
WSAStartup
WSAIoctl
inet_ntoa
send
select
closesocket
recv
ntohs
socket
gethostbyname
htons
connect
setsockopt
WSACleanup
netapi32
NetUserAdd
NetLocalGroupAddMembers
wtsapi32
WTSFreeMemory
Sections
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 428KB - Virtual size: 889KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ