Behavioral task
behavioral1
Sample
030e4ddf252d3bc9bb6ababd9cda0693.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
030e4ddf252d3bc9bb6ababd9cda0693.exe
Resource
win10v2004-20231215-en
General
-
Target
030e4ddf252d3bc9bb6ababd9cda0693
-
Size
876KB
-
MD5
030e4ddf252d3bc9bb6ababd9cda0693
-
SHA1
59db3656b29bc287754e9df6d1e279ddc42dda2a
-
SHA256
e280138d591c923ba9f439a6e0efd4c4a28925db8cef03c8a914d8c3f18e9c3f
-
SHA512
5325627a33ffbee1da21adb4108adce0ff1c865bfde02e534120b98cca06eec29ec93186d5d6caa13e291663c22feb2c0a8784db93c110380e85c35dcd1c32ec
-
SSDEEP
12288:/M5REAfL3aKHx5r+TuxXzNWJBhiFHzsVK2o1HANUT52:/M5RE23aKHx5r+TuxXzcBsFHUo12
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 030e4ddf252d3bc9bb6ababd9cda0693
Files
-
030e4ddf252d3bc9bb6ababd9cda0693.exe windows:4 windows x86 arch:x86
6e823d9b1eea64189ab47ad8b130d058
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
GetModuleFileNameA
OpenProcess
SetFileAttributesA
CopyFileA
GlobalAlloc
GlobalLock
GlobalUnlock
GetStartupInfoA
WaitForSingleObject
GetLastError
CloseHandle
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
DeviceIoControl
GetVersion
LocalAlloc
FindClose
GetVolumeInformationA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetPrivateProfileStringA
FreeLibrary
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
InterlockedExchange
lstrcpyA
WideCharToMultiByte
LoadLibraryA
GetProcAddress
RaiseException
GetModuleHandleA
gdi32
GetDIBits
DeleteDC
DeleteObject
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumValueA
LsaOpenPolicy
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueA
RegOpenKeyExA
RegCloseKey
LsaFreeMemory
IsValidSid
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
_CxxThrowException
strlen
??1exception@@UAE@XZ
_strcmpi
_strnset
_strnicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_purecall
strchr
malloc
free
_except_handler3
strrchr
fclose
fwrite
fopen
exit
atoi
strncmp
strncpy
_errno
wcscpy
strncat
sprintf
_beginthreadex
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??0exception@@QAE@ABQBD@Z
memcpy
??0exception@@QAE@ABV0@@Z
??1type_info@@UAE@XZ
winmm
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveInPrepareHeader
waveInStop
waveOutWrite
waveInAddBuffer
waveInStart
waveOutOpen
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInReset
waveInUnprepareHeader
waveOutGetNumDevs
waveInClose
ws2_32
select
send
inet_ntoa
closesocket
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
recv
ntohs
socket
WSAStartup
WSACleanup
gethostbyname
htons
connect
setsockopt
WSAIoctl
inet_addr
netapi32
NetUserAdd
NetLocalGroupAddMembers
wtsapi32
WTSFreeMemory
Sections
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 428KB - Virtual size: 889KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ