Behavioral task
behavioral1
Sample
c4702f76793a6461fb42e095401cc77c.exe
Resource
win7-20240221-en
General
-
Target
c4702f76793a6461fb42e095401cc77c
-
Size
152KB
-
MD5
c4702f76793a6461fb42e095401cc77c
-
SHA1
271ef22343850ea69e0df4c0523c18611c17adf8
-
SHA256
d78e4d3aec292952119a4cff07f4e3aaa93dfb78271d0529bb4682a1e8b0fb88
-
SHA512
dc72c00ecfc04103c2250a57ab549ac4607f9917eda0523f7dee1d3001243b8062501f48bfc2ab74175979a135a0794a55578393ac9f12f0341c93386ac7a69d
-
SSDEEP
3072:x6JvJuTj9jxXCtte4FO6l4J0cyoDm8PZkBuLzC:xYvkutt8CiioSKkB0
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4702f76793a6461fb42e095401cc77c
Files
-
c4702f76793a6461fb42e095401cc77c.exe windows:4 windows x86 arch:x86
baf3784d9658c0d2cf84c6d520f1d91c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
FreeResource
Sleep
WriteFile
CreateFileA
DeleteFileA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleFileNameA
WaitForSingleObject
CreateEventA
GetProcAddress
LoadLibraryA
GetWindowsDirectoryA
GetTickCount
WinExec
GetLastError
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
GetModuleHandleA
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
__getmainargs
_acmdln
exit
_exit
srand
rand
sprintf
_XcptFilter
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 146KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ