Behavioral task
behavioral1
Sample
d8ebd4c7733192b5844e56db100ca215583742cf5db77a2a579e934eb27160d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d8ebd4c7733192b5844e56db100ca215583742cf5db77a2a579e934eb27160d1.exe
Resource
win10v2004-20231215-en
General
-
Target
bf898b6c42becf5ee4f7c69419d37a80.bin
-
Size
88KB
-
MD5
23b8f39f8384128af066f4551019f938
-
SHA1
cca77edc54cf78e3e31961a65b301853f10624e2
-
SHA256
0171d6e59d0d6c33d8828ac818c42b4e55ba5f6c38e85f71b629be1f26d1b79c
-
SHA512
444f0e76b0682a1b949e9d66003e019c605eae165f12c3d2ea8c659928c4935d2214fd1a3513e711bd61fd73fd8f383e2b6175bbb3da8f4ed3b35caec5ab5a2d
-
SSDEEP
1536:eSNmxGFSvn0T+hGpsNtM0QSc+wEzX7GNsL5GCWlnL2S+G9D+eCpG9QstCnaNUP09:rmxISvnA+vI0QgqsVGC45+queHUP09
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule static1/unpack001/d8ebd4c7733192b5844e56db100ca215583742cf5db77a2a579e934eb27160d1.exe family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d8ebd4c7733192b5844e56db100ca215583742cf5db77a2a579e934eb27160d1.exe
Files
-
bf898b6c42becf5ee4f7c69419d37a80.bin.zip
Password: infected
-
d8ebd4c7733192b5844e56db100ca215583742cf5db77a2a579e934eb27160d1.exe.exe windows:4 windows x86 arch:x86
Password: infected
b7f39532728ce325dc91e2c72b9d27ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
lstrcmpA
SetLastError
CopyFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
WaitForSingleObject
FreeLibrary
GetVersion
SetFilePointer
ReleaseMutex
CreateMutexA
DeleteFileA
GetCurrentThreadId
GetFileTime
lstrcatA
WritePrivateProfileStringA
CreateDirectoryA
lstrcpyA
FreeResource
WriteFile
SizeofResource
LoadResource
FindResourceA
SetFileTime
LocalFileTimeToFileTime
LocalReAlloc
MultiByteToWideChar
CreateFileA
ReadFile
CloseHandle
LocalFree
GetTickCount
LoadLibraryA
Sleep
CreateProcessA
ExitProcess
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
GetProcAddress
CreateRemoteThread
GetCurrentProcess
GetLastError
GetModuleFileNameA
lstrlenA
LocalAlloc
OutputDebugStringA
GetSystemDirectoryA
GetCommandLineA
GetFileAttributesA
user32
CreateWindowExA
wsprintfA
MessageBoxW
CharNextA
GetInputState
PostThreadMessageA
GetMessageA
advapi32
RegOpenKeyExA
RegCreateKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenServiceA
CloseServiceHandle
StartServiceA
OpenSCManagerA
CreateServiceA
RegQueryValueExA
EnumServicesStatusA
QueryServiceConfigA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
shell32
ShellExecuteA
ole32
CoCreateGuid
CoInitialize
CoUninitialize
msvcrt
free
_except_handler3
_strlwr
??1type_info@@UAE@XZ
__dllonexit
_onexit
strstr
rename
isdigit
strtoul
strncmp
malloc
realloc
??3@YAXPAX@Z
__CxxFrameHandler
??2@YAPAXI@Z
sprintf
fclose
fwrite
fread
_stat
fopen
_snprintf
rand
wcslen
strchr
Sections
.data Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ