Behavioral task
behavioral1
Sample
NEAS.004250850adb742f6b637a10376d7a00.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.004250850adb742f6b637a10376d7a00.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.004250850adb742f6b637a10376d7a00.exe
-
Size
196KB
-
MD5
004250850adb742f6b637a10376d7a00
-
SHA1
565281eb7398dcad52e011362769e89fcec59154
-
SHA256
c1d4ea25d217fd581f01c1e87362e0b062bb824b6abe0d640024c42123bfb877
-
SHA512
9e2f5e6dc01dad1d0165e6c5c3f998c418850c03f21ec957533b2a8990a07e3ecbdea0610b51d71d0208036009a6909f42719daf5fdb5b83b05f747b144916ca
-
SSDEEP
3072:x2jjMYP+LXpZ8ZhCLkR/u3PQW/mTBftFvRU6Eba:4vMQMXQZqkFutmTBlFRDEb
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.004250850adb742f6b637a10376d7a00.exe
Files
-
NEAS.004250850adb742f6b637a10376d7a00.exe.exe windows:4 windows x86
1fad2235b0c1f3b68d46b24734f64e95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
ReadFile
SetFilePointer
WriteFile
MoveFileA
GetSystemDirectoryA
GetLocalTime
HeapFree
GetProcessHeap
TerminateProcess
GetCurrentProcess
lstrcmpA
Process32Next
CreateToolhelp32Snapshot
WinExec
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
LocalSize
lstrcmpiA
GetStartupInfoA
GetModuleHandleA
LocalReAlloc
FindNextFileA
LocalFree
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
GetPrivateProfileSectionNamesA
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
TerminateThread
CreateEventA
GetModuleFileNameA
CopyFileA
GetProcAddress
FreeLibrary
CreateMutexA
GetLastError
CloseHandle
ExitProcess
lstrcatA
lstrlenA
SetFileAttributesA
MoveFileExA
GetCurrentProcessId
OpenProcess
SetPriorityClass
LoadLibraryA
SetErrorMode
GetTickCount
OpenEventA
WaitForSingleObject
ReleaseMutex
GetVersionExA
FindClose
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetPrivateProfileStringA
GetSystemInfo
GlobalMemoryStatusEx
Sleep
ExitThread
user32
GetMessageA
CharNextA
GetWindowTextA
GetForegroundWindow
MessageBoxA
TranslateMessage
LoadCursorA
DestroyCursor
SendMessageA
SystemParametersInfoA
mouse_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
IsWindow
CloseWindow
wsprintfA
SetProcessWindowStation
DispatchMessageA
OpenWindowStationA
EnumWindows
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
gdi32
BitBlt
DeleteDC
DeleteObject
GetDIBits
CreateDIBSection
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegQueryValueA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
LookupAccountSidA
GetTokenInformation
RegOpenKeyExA
shell32
SHGetFileInfoA
ShellExecuteExA
SHGetSpecialFolderPathA
avicap32
capCreateCaptureWindowA
capGetDriverDescriptionA
msvfw32
ICSendMessage
ICSeqCompressFrameStart
ICOpen
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICSeqCompressFrame
msvcrt
_strnicmp
__getmainargs
_strupr
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_strcmpi
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
_beginthreadex
strncat
printf
time
srand
rand
realloc
malloc
strstr
strncpy
strncmp
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
_CxxThrowException
strchr
free
_except_handler3
strrchr
atoi
msvcp60
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Winit@std@@QAE@XZ
winmm
waveOutOpen
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutGetNumDevs
waveOutClose
ws2_32
WSAIoctl
WSACleanup
setsockopt
getsockname
gethostname
connect
htons
gethostbyname
WSAGetLastError
inet_ntoa
WSASocketA
htonl
sendto
inet_addr
send
select
recv
ntohs
closesocket
WSAStartup
socket
mfc42
ord6877
ord800
ord939
ord537
ord6648
ord2764
ord4129
ord926
ord924
ord922
ord535
ord858
ord6663
ord860
ord4278
ord2818
ord540
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE