Behavioral task
behavioral1
Sample
ii9900.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ii9900.exe
Resource
win10v2004-20221111-en
General
-
Target
ii9900.exe
-
Size
100KB
-
MD5
7f1bfbcc10576a23b800dbd15576aa55
-
SHA1
ccfbfcad8957c9296479ba7e3704512cf1b77916
-
SHA256
b46334ea454a159b27642cbd4a57aef35abd8701bd7fb95ccbdb10f7083a9d92
-
SHA512
2f2fc0b4f7d7667579b06e75c13537ce7c7aef1cf825e919a9e858956b408a33be66d7917baa2956592580f42555dccda5ca900a44d249756c3a3ab5e60f9e7e
-
SSDEEP
1536:WK+w0tcggsfMCSI15Nt8Q1cRTaYzBwhc8N/0J4QyAt6:h+w0tHgOMCS259Yz2cG0JvyAt6
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
Files
-
ii9900.exe.exe windows x86
9841aa597c9582d1c5fcf1d22f5df3c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
TerminateThread
lstrlenA
ExitProcess
lstrcpyA
GetVersionExA
GetTickCount
OpenEventA
SetErrorMode
GetModuleFileNameA
CreateFileA
Sleep
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
CancelIo
InterlockedExchange
SetEvent
WaitForSingleObject
CloseHandle
CreateEventA
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
GetStringTypeA
MultiByteToWideChar
InterlockedIncrement
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
RaiseException
HeapAlloc
GetLastError
CreateThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapFree
TlsAlloc
SetLastError
SetUnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TerminateProcess
GetCurrentProcess
HeapSize
user32
wsprintfA
SetProcessWindowStation
OpenWindowStationA
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
GetProcessWindowStation
ExitWindowsEx
advapi32
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
shell32
ShellExecuteA
ws2_32
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
select
recv
closesocket
send
getsockname
gethostname
socket
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE