Behavioral task
behavioral1
Sample
fefcf690c758336449eea2a2fc592486431fb1d701612bdd30f14a4d413a9595.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fefcf690c758336449eea2a2fc592486431fb1d701612bdd30f14a4d413a9595.exe
Resource
win10v2004-20220901-en
General
-
Target
fefcf690c758336449eea2a2fc592486431fb1d701612bdd30f14a4d413a9595
-
Size
256KB
-
MD5
bf6f78e5b3a74a6b82da93e2c6c5eb9b
-
SHA1
a39a50add35dddfdd8d0a6b262225388abb3029e
-
SHA256
fefcf690c758336449eea2a2fc592486431fb1d701612bdd30f14a4d413a9595
-
SHA512
63672fdf846217df9455b07c18bdec9fea4959eaf584d9fa90307db7bea7ceac50a5d597898ca06233b2cbd4e3d93fab357fb501b94c2c201d63a2885212d400
-
SSDEEP
3072:Pysc8nl3VzUmXWillt51rBWlWVAqvEeO/V1VrNYQsCA+HFSNvF3TBftsnob2Q6:aAVzUatLlWlV9DNYVEHyvF3TBlsnobF6
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
fefcf690c758336449eea2a2fc592486431fb1d701612bdd30f14a4d413a9595.exe windows x86
b2e9ff49c9d76c53ef8c4e7cdf6ca830
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
GetProcAddress
LoadLibraryA
lstrcmpiA
GetCurrentProcess
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
CreateThread
GetCurrentThreadId
LoadResource
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
ReadFile
SetEndOfFile
GetOEMCP
GetACP
GetCPInfo
GetWindowsDirectoryA
lstrcatA
SetFilePointer
lstrlenA
IsBadCodePtr
IsBadReadPtr
CreateFileA
CloseHandle
FreeResource
Sleep
GetStringTypeW
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapAlloc
HeapFree
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetLastError
FlushFileBuffers
user32
GetInputState
PostThreadMessageA
GetMessageA
PostMessageA
GetTopWindow
GetWindow
GetClassNameA
GetWindowTextA
ShowWindow
FindWindowExA
GetDesktopWindow
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
ShellExecuteExA
crypt32
CertAddCertificateContextToStore
CertCreateCertificateContext
CertOpenStore
CertOpenSystemStoreA
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ