Antivirus
Behavioral task
behavioral1
Sample
b62a9e20b446f140809ff49747a3ab95d0307bacffaadb348b5c1c1e2d0aefb4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b62a9e20b446f140809ff49747a3ab95d0307bacffaadb348b5c1c1e2d0aefb4.dll
Resource
win10v2004-20220812-en
General
-
Target
b62a9e20b446f140809ff49747a3ab95d0307bacffaadb348b5c1c1e2d0aefb4
-
Size
131KB
-
MD5
9427f62d8d1d7788975b2948021215d2
-
SHA1
9682d0f7567882b5b0b432d921c0eb6034d4d7b3
-
SHA256
b62a9e20b446f140809ff49747a3ab95d0307bacffaadb348b5c1c1e2d0aefb4
-
SHA512
7e1cbff5fa338b7b594aabc46c24cc45d8e88c878fb99a6d117418986b1aef9a17c1a57542537868016ba4199e09a333ce2f19d335ae05df8e60530864a13af6
-
SSDEEP
3072:ZmzZcs113oEgHyxUpLgIG5TBftAWHtmq4Ye:0b13ozH3RgIG5TBlAWHtmF
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
b62a9e20b446f140809ff49747a3ab95d0307bacffaadb348b5c1c1e2d0aefb4.dll windows x86
c2b85896cba7d02fb50b57d180a841b7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
lstrlenA
lstrcpyA
lstrcmpiA
InitializeCriticalSection
VirtualFree
LeaveCriticalSection
VirtualAlloc
InterlockedExchange
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
FreeLibrary
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
GetVersionExA
ExpandEnvironmentStringsA
lstrcatA
GetSystemDirectoryA
GetLastError
SetEnvironmentVariableA
GetTempPathA
GetCurrentProcess
GetLongPathNameA
GetModuleFileNameA
Sleep
LocalReAlloc
LocalAlloc
GetTempFileNameA
GetTickCount
GetLocalTime
GlobalUnlock
GlobalLock
GlobalSize
HeapFree
GetProcessHeap
MapViewOfFile
CreateFileMappingA
HeapAlloc
SetUnhandledExceptionFilter
FormatMessageA
VirtualQuery
IsBadWritePtr
LocalSize
GlobalFree
GlobalAlloc
InterlockedDecrement
InterlockedIncrement
ExitProcess
GetExitCodeProcess
GlobalMemoryStatusEx
GetSystemInfo
GetCurrentThreadId
RaiseException
LocalFree
CloseHandle
LoadLibraryA
user32
FindWindowA
wsprintfA
ShowWindow
EnumThreadWindows
CreateWindowExA
GetCursorInfo
DestroyCursor
LoadCursorA
BlockInput
CloseWindowStation
wvsprintfA
advapi32
RegOpenKeyExW
ws2_32
inet_addr
__WSAFDIsSet
ioctlsocket
accept
bind
listen
getsockname
send
shutdown
closesocket
select
recv
gethostname
gethostbyname
socket
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
msvcrt
??3@YAXPAX@Z
strchr
_except_handler3
_CxxThrowException
strncpy
strstr
_ftol
ceil
memmove
__CxxFrameHandler
??2@YAPAXI@Z
_adjust_fdiv
_initterm
_onexit
__dllonexit
??1type_info@@UAE@XZ
_strupr
_memicmp
_strlwr
_beginthreadex
wcstombs
atoi
realloc
srand
rand
strncat
strrchr
malloc
free
Exports
Exports
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dataseg Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ