Behavioral task
behavioral1
Sample
12d4afc84ad9cface8350f9db22b9b6284a4c13def3e5add2c5edee176446a86.exe
Resource
win7-20230712-en
General
-
Target
12d4afc84ad9cface8350f9db22b9b6284a4c13def3e5add2c5edee176446a86
-
Size
64KB
-
MD5
297271d34dfb4a09d7b6cc638f86b157
-
SHA1
b99ebace53f4573d676083c20664137209345bdd
-
SHA256
12d4afc84ad9cface8350f9db22b9b6284a4c13def3e5add2c5edee176446a86
-
SHA512
61ab4be89dc6f832ad3b774082ae9a6e80ebc51d174c3108c599da942221de5f1dedcafac1f84295bfbd18400199f7db174281dc72bfee5028359e79516fdb4e
-
SSDEEP
768:Hf8t6upP3EucZiQ1eth0nljc7jngtgEisKMWr3Pz1UVg8HZH8l8KxgAwJa:O6wvOHNlgjng4s/EBI5S4AT
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12d4afc84ad9cface8350f9db22b9b6284a4c13def3e5add2c5edee176446a86
Files
-
12d4afc84ad9cface8350f9db22b9b6284a4c13def3e5add2c5edee176446a86.exe windows x86
5c85189ac442e1f9fa07b127f1585e28
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__commode
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
__p__fmode
__set_app_type
??3@YAXPAX@Z
_acmdln
_onexit
__dllonexit
_beginthreadex
_CxxThrowException
time
srand
_mbscmp
_mbsicmp
_access
sprintf
_splitpath
_stricmp
_strnicmp
_strdup
strstr
_except_handler3
isalnum
free
realloc
malloc
??2@YAPAXI@Z
__CxxFrameHandler
_ftol
memmove
_controlfp
mfc42
ord537
ord389
ord5207
ord2915
ord690
ord540
ord860
ord940
ord941
ord800
kernel32
GetStartupInfoA
GetModuleHandleA
Process32First
Process32Next
lstrcmpiA
CopyFileA
GetCurrentThreadId
ExpandEnvironmentStringsA
GlobalUnlock
GlobalLock
GlobalAlloc
TerminateProcess
OpenEventA
CreateThread
SetFileAttributesA
RemoveDirectoryA
GetLocalTime
CreateDirectoryA
DuplicateHandle
DeleteFileA
ExitProcess
GetModuleFileNameA
SetProcessWorkingSetSize
FindFirstFileA
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
Sleep
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
CancelIo
WriteFile
SetFilePointer
CreateFileA
GetFileSize
ReadFile
GetWindowsDirectoryA
GetFileAttributesA
CreateProcessA
lstrlenA
GetCurrentProcess
GetVersion
DeviceIoControl
Beep
TerminateThread
lstrcatA
GetTickCount
GetLastError
HeapAlloc
GetProcessHeap
VirtualProtect
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
LoadLibraryW
GetDiskFreeSpaceExA
GetDriveTypeA
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
MultiByteToWideChar
FindClose
FindNextFileA
OpenProcess
user32
GetThreadDesktop
GetUserObjectInformationA
SetThreadDesktop
CloseDesktop
GetInputState
GetMessageA
OpenClipboard
GetClipboardData
OpenInputDesktop
SetClipboardData
CloseClipboard
GetWindowTextA
GetWindow
GetClassNameA
FindWindowA
ShowWindow
GetForegroundWindow
MoveWindow
OpenDesktopA
EmptyClipboard
SendMessageA
SwapMouseButton
ExitWindowsEx
wsprintfA
GetWindowRect
advapi32
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
OpenServiceA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
CreateServiceA
OpenSCManagerA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
send
gethostname
getsockname
select
closesocket
socket
gethostbyname
htons
ntohs
recv
connect
setsockopt
WSACleanup
WSAStartup
WSAIoctl
msvcp60
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
winmm
mciSendStringA
wininet
FindFirstUrlCacheEntryA
InternetCloseHandle
FindNextUrlCacheEntryA
DeleteUrlCacheEntry
ole32
CoCreateInstance
CoInitialize
CoUninitialize
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ