PluginMe
Behavioral task
behavioral1
Sample
11b3fe04f35b93a9ee14adb89374498619520cd3bf2a52d8ca2e0f5d5211b0a7.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
11b3fe04f35b93a9ee14adb89374498619520cd3bf2a52d8ca2e0f5d5211b0a7.exe
Resource
win10v2004-20231020-en
General
-
Target
11b3fe04f35b93a9ee14adb89374498619520cd3bf2a52d8ca2e0f5d5211b0a7
-
Size
239KB
-
MD5
cc17d1a3d53ada0dedc7e269e7fc602c
-
SHA1
5eea08eafe20193a1a93ee28aa2b1df09dc7e373
-
SHA256
11b3fe04f35b93a9ee14adb89374498619520cd3bf2a52d8ca2e0f5d5211b0a7
-
SHA512
0beab5e07531f775c60334523e080a4f9df4f4e198242bdea3521cf6918a8b29d1d332cb572cfcb2436d407bb911f1de7b540248b0d46ca1ac8f6c9c6c9d8712
-
SSDEEP
6144:G68qc6Oe5iSo0/ASfaBO55s1yPzkJhYhFTBltLssf6:G6Tc6Oe5iSo0/ASfaj1yPzkaFT3O
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 11b3fe04f35b93a9ee14adb89374498619520cd3bf2a52d8ca2e0f5d5211b0a7
Files
-
11b3fe04f35b93a9ee14adb89374498619520cd3bf2a52d8ca2e0f5d5211b0a7.exe windows:4 windows x86
3be3176fdd19e8fe438fcf7d3dac25ed
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
MoveFileA
SizeofResource
FreeResource
LockResource
LoadResource
FindResourceExA
GetStartupInfoA
OpenProcess
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
WinExec
ReleaseMutex
GetLocalTime
GetModuleHandleA
TerminateThread
ExitProcess
GetModuleFileNameA
CreateMutexA
GetExitCodeThread
ResumeThread
MoveFileExA
GlobalFree
GlobalSize
CreatePipe
DisconnectNamedPipe
FindFirstFileA
WaitForMultipleObjects
GetSystemInfo
GetCurrentProcess
GetUserDefaultLangID
GetThreadContext
GetCurrentThread
InterlockedDecrement
GlobalMemoryStatusEx
OpenEventA
IsDebuggerPresent
SetFileAttributesA
GetCommandLineA
lstrcpyW
Module32Next
Module32First
CreateRemoteThread
Thread32Next
Thread32First
GetTempPathA
QueryDosDeviceA
GetModuleHandleW
GetPriorityClass
lstrcpynA
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetCurrentThreadId
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateDirectoryA
GetLastError
DeleteFileA
SetFilePointer
WriteFile
GetFileAttributesA
GetFileSize
ReadFile
IsBadReadPtr
VirtualProtect
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
CreateProcessA
TerminateProcess
GetSystemDirectoryA
lstrcatA
lstrcpyA
FreeLibrary
CreateThread
ExitThread
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CreateEventA
LoadLibraryA
GetProcAddress
lstrlenA
LocalReAlloc
LocalSize
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateFileA
DeviceIoControl
CloseHandle
LocalAlloc
PeekNamedPipe
user32
DispatchMessageA
GetMessageA
SetWindowsHookExA
GetLastInputInfo
EnumWindows
UnregisterClassA
TranslateMessage
UpdateWindow
ShowWindow
SetWindowLongA
CreateWindowExA
RegisterClassA
LoadIconA
LoadCursorA
DestroyWindow
CallNextHookEx
SendMessageA
PostQuitMessage
GetWindowLongA
PostMessageA
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
GetKeyState
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
EnumDisplaySettingsA
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
FindWindowExA
GetWindowThreadProcessId
FindWindowA
ExitWindowsEx
GetWindowRect
IsWindowVisible
GetForegroundWindow
GetWindowTextA
MessageBoxA
CloseDesktop
CharLowerBuffA
CharNextA
wsprintfA
EmptyClipboard
SetClipboardData
OpenClipboard
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
OpenDesktopA
GetClipboardData
CloseClipboard
MapVirtualKeyA
DefWindowProcA
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
GetStockObject
SelectObject
advapi32
OpenServiceA
GetTokenInformation
LookupAccountSidA
GetUserNameA
AbortSystemShutdownA
QueryServiceStatusEx
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
ControlService
QueryServiceStatus
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
StartServiceA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegQueryInfoKeyA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
ShellExecuteA
ord680
SHGetFileInfoA
ole32
CoUninitialize
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoInitialize
oleaut32
VariantInit
SysAllocString
SysFreeString
VariantClear
shlwapi
PathFileExistsA
PathAppendA
msvcrt
ftell
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_strupr
_stricmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_iob
_onexit
__dllonexit
??1type_info@@UAE@XZ
_snprintf
_mbsncmp
atol
_mbscmp
_mbsstr
wcscpy
wcstombs
wcslen
mbstowcs
_mbsicmp
_beginthreadex
sscanf
_fsopen
fseek
fclose
rewind
fread
_strdup
_mbsrchr
strncat
strncmp
exit
system
strtoul
strrchr
free
realloc
malloc
time
srand
strchr
sprintf
strcspn
strncpy
atoi
rand
_CxxThrowException
??2@YAPAXI@Z
_ftol
ceil
memmove
_except_handler3
strstr
??3@YAXPAX@Z
__CxxFrameHandler
ws2_32
__WSAFDIsSet
WSACleanup
accept
recvfrom
WSARecv
WSAAsyncGetHostByName
getpeername
WSASend
getsockname
ntohs
WSAStartup
WSAConnect
WSAAsyncSelect
bind
listen
WSAGetLastError
gethostname
inet_ntoa
WSASocketA
htonl
sendto
inet_addr
send
closesocket
recv
select
WSAIoctl
connect
htons
gethostbyname
socket
setsockopt
urlmon
URLDownloadToFileA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
VerQueryValueW
wininet
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
netapi32
NetUserSetInfo
NetUserDel
NetUserAdd
NetUserGetLocalGroups
NetApiBufferFree
NetUserGetInfo
NetLocalGroupAddMembers
NetUserEnum
psapi
EnumProcessModules
GetProcessMemoryInfo
GetProcessImageFileNameA
GetModuleFileNameExA
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
WTSQuerySessionInformationA
WTSDisconnectSession
WTSLogoffSession
WTSEnumerateSessionsA
Exports
Exports
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ