Behavioral task
behavioral1
Sample
0f357f6420cd0160871d90a0abdcbaa5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f357f6420cd0160871d90a0abdcbaa5.exe
Resource
win10v2004-20231215-en
General
-
Target
0f357f6420cd0160871d90a0abdcbaa5
-
Size
526KB
-
MD5
0f357f6420cd0160871d90a0abdcbaa5
-
SHA1
983644e7aaaf5f17ccc0c4a4bf813e782db041b8
-
SHA256
447b3520e8e7fd11e709a4916d08511c21830c53b3b6ad7c6abe8280f098fb56
-
SHA512
5cac08fdd93dc4c018814467e160f761d65786e37b32674866ae41ab51d6190255c24b4e800b50eae4aac834ca7e0bc49955a1479eba66f10108b518f08b594f
-
SSDEEP
12288:q08PKZVQQxfnr+TK7r79/J0NWNf37JcAayM5ahHjc:t8AVQQxfnr+TK7r79/J0ofrJEyM5ahDc
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f357f6420cd0160871d90a0abdcbaa5
Files
-
0f357f6420cd0160871d90a0abdcbaa5.exe windows:4 windows x86 arch:x86
4e800f42ea6c3a2c23b6c5e9b16ba2c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
avicap32
capGetDriverDescriptionA
wininet
InternetReadFile
InternetOpenA
kernel32
GetStartupInfoA
OpenProcess
Process32Next
GetLastError
RaiseException
GetModuleHandleA
GetProcAddress
LoadLibraryA
LeaveCriticalSection
WideCharToMultiByte
lstrcpyA
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetVolumeInformationA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
MoveFileA
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameA
CopyFileA
CloseHandle
WriteFile
SetFilePointer
user32
GetUserObjectInformationA
GetThreadDesktop
CreateWindowExA
CloseWindow
GetClientRect
SendMessageA
GetDlgItem
SetDlgItemTextA
GetDlgItemTextA
SetWindowPos
ShowWindow
CreateDialogParamA
EndDialog
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
OpenInputDesktop
LoadCursorA
DestroyCursor
SystemParametersInfoA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
PostMessageA
OpenDesktopA
DispatchMessageA
TranslateMessage
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetCursorPos
GetKeyState
GetMessageA
GetCursorInfo
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
advapi32
LookupAccountNameA
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
IsValidSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
msvcrt
__CxxFrameHandler
memcpy
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_CxxThrowException
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
vsprintf
_beginthreadex
sprintf
strncat
wcscpy
_errno
strncpy
strncmp
atoi
exit
strrchr
_except_handler3
free
malloc
strchr
_purecall
strstr
_ftol
ceil
memmove
??1type_info@@UAE@XZ
??3@YAXPAX@Z
??2@YAPAXI@Z
urlmon
URLDownloadToFileA
netapi32
NetUserAdd
NetLocalGroupAddMembers
psapi
EnumProcessModules
GetModuleFileNameExA
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 409KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ