Behavioral task
behavioral1
Sample
54b0764e5e70e7e208a24d950784d9b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54b0764e5e70e7e208a24d950784d9b1.exe
Resource
win10v2004-20231215-en
General
-
Target
54b0764e5e70e7e208a24d950784d9b1
-
Size
659KB
-
MD5
54b0764e5e70e7e208a24d950784d9b1
-
SHA1
29ba070acd5b45b0c28df01184d2af3703a315af
-
SHA256
e523b094a5d4b68477a7965851cb3a5c100d887c89420149bbc79ac3ed66bb45
-
SHA512
1076347a3930c784c9fba7749344f2845469b6aa7a2afa96a72deb1365c0d29ff221a5a08267408cfa09693afa1b2536791809aff7f9f45cfa92d61307b3e2b9
-
SSDEEP
12288:kcq1tZVQQxfnr+TK7r79/JWXWQ2M//iCf+KpM56mFWYJ:kcq1VQQxfnr+TK7r79/JWX2+aCXpM56O
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54b0764e5e70e7e208a24d950784d9b1
Files
-
54b0764e5e70e7e208a24d950784d9b1.exe windows:4 windows x86 arch:x86
499e51f9fefb972f92cbf09946332e3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
FreeLibrary
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetVolumeInformationA
FindClose
LocalFree
FindFirstFileA
LocalAlloc
GetVersion
DeviceIoControl
Sleep
MultiByteToWideChar
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameA
CopyFileA
CloseHandle
WriteFile
SetFilePointer
GetStartupInfoA
OpenProcess
GetProcAddress
LoadLibraryA
LeaveCriticalSection
WideCharToMultiByte
lstrcpyA
InterlockedExchange
lstrlenA
RaiseException
GetLastError
GetPrivateProfileSectionNamesA
GetModuleHandleA
user32
CreateWindowExA
PostMessageA
OpenInputDesktop
CloseDesktop
EnumWindows
GetMessageA
LoadIconA
RegisterClassExA
UpdateWindow
DefWindowProcA
GetCursorPos
GetCursorInfo
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
IsWindowVisible
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
SystemParametersInfoA
DestroyCursor
LoadCursorA
GetKeyState
GetAsyncKeyState
GetForegroundWindow
GetWindowTextA
ExitWindowsEx
MessageBoxA
CharNextA
EndDialog
CreateDialogParamA
ShowWindow
TranslateMessage
GetClipboardData
SetWindowPos
GetDlgItemTextA
SetDlgItemTextA
GetDlgItem
SendMessageA
GetClientRect
CloseWindow
DispatchMessageA
gdi32
CreateCompatibleBitmap
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateDIBSection
SelectObject
shell32
SHGetSpecialFolderPathA
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
oleaut32
SysFreeString
msvcrt
_controlfp
__set_app_type
_strnicmp
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
calloc
vsprintf
_beginthreadex
sprintf
strncat
wcscpy
_errno
strncpy
strncmp
atoi
exit
strrchr
_except_handler3
free
malloc
strchr
_purecall
strstr
_ftol
ceil
_strcmpi
??0exception@@QAE@ABV0@@Z
strlen
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memcpy
__p__fmode
memmove
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
??1type_info@@UAE@XZ
winmm
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInStart
waveOutWrite
waveInStop
waveInReset
waveInUnprepareHeader
waveInClose
waveOutReset
waveOutUnprepareHeader
waveOutClose
waveInAddBuffer
ws2_32
closesocket
select
send
inet_ntoa
inet_addr
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
gethostname
recv
ntohs
socket
WSAStartup
WSACleanup
gethostbyname
htons
connect
setsockopt
WSAIoctl
netapi32
NetLocalGroupAddMembers
NetUserAdd
wtsapi32
WTSFreeMemory
Sections
.text Size: 412KB - Virtual size: 410KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 474KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ