Behavioral task
behavioral1
Sample
ec82f079d6264efa0e12e1cf614ba5a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ec82f079d6264efa0e12e1cf614ba5a5.exe
Resource
win10v2004-20231215-en
General
-
Target
ec82f079d6264efa0e12e1cf614ba5a5.exe
-
Size
99KB
-
MD5
ec82f079d6264efa0e12e1cf614ba5a5
-
SHA1
261524f3b04e1ddc241ebf8a0254188e80a02eab
-
SHA256
7b9d1560e2b8be4f57e4fa039d7586d1a24c57b570828706dbaeff7add2b584a
-
SHA512
aa43bbeb1626127c29a524e2395de023da6a369239663dfcfdc4e6d9da721e8ee23c1e02fccf516d646113d3c0dae5daa63f624c623286f6377524d471372514
-
SSDEEP
3072:eQ4I6c8jV8YEU/p/5xoSHglTccqIZPLJgBjCpk:eQL6c858YEUBBMTl9ZTJgBWS
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec82f079d6264efa0e12e1cf614ba5a5.exe
Files
-
ec82f079d6264efa0e12e1cf614ba5a5.exe.exe windows:4 windows x86 arch:x86
44d4acecabe255908a1d72c95d74ddac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
SetLastError
GetFileAttributesA
lstrcmpA
GetSystemDirectoryA
ReadFile
SetFilePointer
GetModuleFileNameA
CreateToolhelp32Snapshot
GetTempPathA
ReleaseMutex
CreateMutexA
GetCommandLineA
GetCurrentThreadId
CreateThread
GetTickCount
lstrcmpiA
FindResourceA
LoadResource
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
FreeResource
MoveFileA
SetFileAttributesA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
Process32First
Process32Next
CloseHandle
lstrcatA
GetLastError
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
HeapFree
Sleep
lstrlenA
SetUnhandledExceptionFilter
user32
DispatchMessageA
DefWindowProcA
wsprintfA
GetDesktopWindow
GetTopWindow
GetWindowRect
WindowFromPoint
TranslateMessage
GetCursorPos
SendMessageA
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
SetCursorPos
GetMessageA
UpdateWindow
RegisterClassExA
LoadCursorA
LoadIconA
GetInputState
PostThreadMessageA
CreateWindowExA
mouse_event
ShowWindow
advapi32
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
SetSecurityDescriptorDacl
GetSecurityDescriptorControl
SetFileSecurityA
GetUserNameA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
StartServiceA
ChangeServiceConfigA
OpenServiceA
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
GetLengthSid
msvcrt
_except_handler3
realloc
malloc
strchr
??2@YAPAXI@Z
__CxxFrameHandler
_EH_prolog
??3@YAXPAX@Z
strstr
??1type_info@@UAE@XZ
__dllonexit
_onexit
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ