Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp
-
Size
115KB
-
MD5
2a531fb5a055bec266f11c721ee3deca
-
SHA1
59e420e47955066e9867cc9729fa686c900f623d
-
SHA256
d8b52233d360be77ce7dc53efa56b50c039c6e8d3e579b239cec8131c6a1c4a0
-
SHA512
000027101f5ea9bf6050344dc4b92161d6106924c4a7a14e68d317747dd6cec7cd42565c1c873aa97d62804a4aa3cdc934ba156af597a427021469823820b160
-
SSDEEP
1536:8BlhXZ0gaYZl5yXmhVzjn7qcc3lIOwnToIftSxb3pY+LmTHh20:mXTLhVfnvc3vETBftSxb3pY+LmTHh2
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows x86
a9a1a9708843c8adf71cdab349fb6131
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetFileAttributesA
GetProcAddress
LoadLibraryA
FreeLibrary
GetVersionExA
ExitProcess
GetModuleFileNameA
CreateProcessA
lstrlenA
GetLastError
GetCurrentProcess
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
Sleep
TerminateThread
CreateThread
lstrcatA
GetTickCount
DeleteFileA
HeapAlloc
GetProcessHeap
GetDiskFreeSpaceExA
GetDriveTypeA
GetCurrentThreadId
GetModuleHandleA
GlobalMemoryStatusEx
GetSystemInfo
OutputDebugStringA
SetErrorMode
SetUnhandledExceptionFilter
SetPriorityClass
GetCurrentProcessId
GetStartupInfoA
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
lstrcpyA
user32
wsprintfA
CloseDesktop
SetThreadDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenInputDesktop
OpenDesktopA
GetClassNameA
GetWindow
GetWindowTextA
FindWindowA
SetProcessWindowStation
OpenWindowStationA
advapi32
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
GetUserNameA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegSetValueExA
CloseEventLog
shell32
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysFreeString
mfc42
ord825
ord823
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_exit
_strcmpi
free
realloc
_beginthreadex
sprintf
atol
_except_handler3
malloc
__CxxFrameHandler
_ftol
_XcptFilter
atoi
memmove
ws2_32
recv
WSAIoctl
setsockopt
connect
htons
select
socket
closesocket
send
WSACleanup
gethostname
getsockname
WSAStartup
gethostbyname
iphlpapi
GetIfTable
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
Sections
.text Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ