Behavioral task
behavioral1
Sample
73519635613976becd5e58014262d1d97a41cacb3e45a315184503cf50ead135.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
73519635613976becd5e58014262d1d97a41cacb3e45a315184503cf50ead135.exe
Resource
win10v2004-20220812-en
General
-
Target
73519635613976becd5e58014262d1d97a41cacb3e45a315184503cf50ead135
-
Size
140KB
-
MD5
25826ed5ce2f7947004cefaa86a04500
-
SHA1
384db7d1e2ea5dc60e35670d94df1757db5d8cc4
-
SHA256
73519635613976becd5e58014262d1d97a41cacb3e45a315184503cf50ead135
-
SHA512
1159a82d3fd8f3ba9b6f2245922c6c73a67c123a0bb522344ce59c575792e120ce997246596123e37a3e2d3ed91f3edc5a966cda96d117a067abef5199d33435
-
SSDEEP
3072:YE/AWcWhxJiAnKbDcG9qcB4Kj0764+QAmABcj:YE/GatnKPZQcBNj0764+QAmABW
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
73519635613976becd5e58014262d1d97a41cacb3e45a315184503cf50ead135.exe windows x86
4d13c5c4da07e6c020a319a35dbb13b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
RaiseException
GetModuleHandleA
GetLastError
OutputDebugStringA
CreateThread
OpenEventA
GetTickCount
ReleaseMutex
GetModuleFileNameA
GetVersionExA
WriteFile
GetStartupInfoA
DeleteFileA
MoveFileA
TerminateThread
FreeLibrary
CreateFileA
LocalFree
GetDriveTypeA
Sleep
CancelIo
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
LoadLibraryA
GetProcAddress
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
LocalAlloc
user32
ExitWindowsEx
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
CharNextA
wsprintfA
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueA
RegCloseKey
RegQueryValueExA
shell32
SHGetFileInfoA
msvcrt
_XcptFilter
_strrev
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memmove
ceil
_ftol
strstr
??2@YAPAXI@Z
free
malloc
strrchr
rename
_except_handler3
strchr
atoi
_beginthreadex
calloc
??1type_info@@UAE@XZ
_exit
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ