Behavioral task
behavioral1
Sample
226b5275911dc1fd39a97be3d5f8004c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
226b5275911dc1fd39a97be3d5f8004c.exe
Resource
win10v2004-20231215-en
General
-
Target
226b5275911dc1fd39a97be3d5f8004c
-
Size
878KB
-
MD5
226b5275911dc1fd39a97be3d5f8004c
-
SHA1
1a55b684bdf20a62a5cf42e1a6f14280966d2584
-
SHA256
c2b9de39a0f0a463772d2c879fb4a2b8d1b0575212424a896eb06bbf7906a9ee
-
SHA512
b66832c7d198d3532e7c7d6cdb25a50b6fcc27fc2b41aa70e731f73276b53ebfb09826f55098ad06222b8439269f9b4b4661664519ab0105e0b5745006284942
-
SSDEEP
12288:/M5REAfL3aKHx5r+TuxXzNWJBhiFHzsVK2oAuD:/M5RE23aKHx5r+TuxXzcBsFHUoAuD
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 226b5275911dc1fd39a97be3d5f8004c
Files
-
226b5275911dc1fd39a97be3d5f8004c.exe windows:4 windows x86 arch:x86
6e823d9b1eea64189ab47ad8b130d058
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
GetModuleFileNameA
OpenProcess
SetFileAttributesA
CopyFileA
GlobalAlloc
GlobalLock
GlobalUnlock
GetStartupInfoA
WaitForSingleObject
GetLastError
CloseHandle
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
DeviceIoControl
GetVersion
LocalAlloc
FindClose
GetVolumeInformationA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetPrivateProfileStringA
FreeLibrary
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
InterlockedExchange
lstrcpyA
WideCharToMultiByte
LoadLibraryA
GetProcAddress
RaiseException
GetModuleHandleA
gdi32
GetDIBits
DeleteDC
DeleteObject
CreateDIBSection
SelectObject
CreateCompatibleBitmap
advapi32
LsaClose
RegOpenKeyA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegEnumValueA
LsaOpenPolicy
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueA
RegOpenKeyExA
RegCloseKey
LsaFreeMemory
IsValidSid
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoTaskMemFree
oleaut32
SysFreeString
msvcrt
_CxxThrowException
strlen
??1exception@@UAE@XZ
_strcmpi
_strnset
_strnicmp
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
memmove
ceil
_ftol
strstr
_purecall
strchr
malloc
free
_except_handler3
strrchr
fclose
fwrite
fopen
exit
atoi
strncmp
strncpy
_errno
wcscpy
strncat
sprintf
_beginthreadex
vsprintf
calloc
__dllonexit
_onexit
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
??0exception@@QAE@ABQBD@Z
memcpy
??0exception@@QAE@ABV0@@Z
??1type_info@@UAE@XZ
winmm
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveInPrepareHeader
waveInStop
waveOutWrite
waveInAddBuffer
waveInStart
waveOutOpen
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInReset
waveInUnprepareHeader
waveOutGetNumDevs
waveInClose
ws2_32
select
send
inet_ntoa
closesocket
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
recv
ntohs
socket
WSAStartup
WSACleanup
gethostbyname
htons
connect
setsockopt
WSAIoctl
inet_addr
netapi32
NetUserAdd
NetLocalGroupAddMembers
wtsapi32
WTSFreeMemory
Sections
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 428KB - Virtual size: 889KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ