Behavioral task
behavioral1
Sample
42adfae88b48b63737ddd9f7524e5e49.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
42adfae88b48b63737ddd9f7524e5e49.exe
Resource
win10v2004-20231215-en
General
-
Target
42adfae88b48b63737ddd9f7524e5e49
-
Size
81KB
-
MD5
42adfae88b48b63737ddd9f7524e5e49
-
SHA1
9da6566d8de153b860802fe2eaa92b6aea6829ac
-
SHA256
b04842cd087eadd8db66a3662f48051f3f5f1d7323310f5d9cbc9e36f84132b8
-
SHA512
8d1ff26defa985237541eeaf52c18d542e3433d0023792ebace300a605c498482b73258056433fec9c3428f667a9ec28606cf4e3fceb68eb86a359ba25e1eabc
-
SSDEEP
1536:haTP8tQmCCyc+oAotc9T3NWVcyR+fGA7cT0CrJKoxVz7xgK:haDwyc3uNWVBR4GA7cTjFKoxVz7P
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42adfae88b48b63737ddd9f7524e5e49
Files
-
42adfae88b48b63737ddd9f7524e5e49.exe windows:4 windows x86 arch:x86
0725eaa945fd92d280cdf0ecf6e23c8d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetSystemDirectoryA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatus
SetLastError
ReleaseMutex
OpenEventA
GlobalFree
SetUnhandledExceptionFilter
SetErrorMode
GetTempPathA
SetHandleInformation
FreeConsole
ExitProcess
GetCurrentThreadId
GetWindowsDirectoryA
GetCommandLineA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetTickCount
MoveFileExA
GetSystemTime
WinExec
TerminateThread
OpenProcess
FreeLibrary
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetVersionExA
LoadLibraryA
GetProcAddress
GetCurrentProcess
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
GetLastError
InitializeCriticalSection
DeleteFileA
Sleep
CancelIo
InterlockedExchange
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
CreateMutexA
user32
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorInfo
GetCursorPos
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetMessageA
PostThreadMessageA
GetInputState
CloseDesktop
SetThreadDesktop
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
CharNextA
wsprintfA
MessageBoxA
gdi32
DeleteDC
CreateCompatibleDC
GetDIBits
CreateCompatibleBitmap
BitBlt
DeleteObject
CreateDIBSection
SelectObject
advapi32
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
CreateServiceA
RegOpenKeyA
OpenServiceA
OpenSCManagerA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
SetServiceStatus
shell32
ShellExecuteA
SHGetFileInfoA
shlwapi
SHDeleteKeyA
msvcrt
strncat
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
strlen
??0exception@@QAE@ABV0@@Z
_strcmpi
_strnicmp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
srand
rand
strncpy
atoi
realloc
memcpy
strchr
strrchr
_except_handler3
malloc
free
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
memmove
??3@YAXPAX@Z
ws2_32
getsockname
send
closesocket
gethostname
select
socket
WSAStartup
WSACleanup
WSAIoctl
gethostbyname
htons
connect
setsockopt
recv
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
avicap32
capGetDriverDescriptionA
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ