Behavioral task
behavioral1
Sample
e64fb963200b856cfe03faa7f1204826cdd23110a08fed9d84aabff92c5ea387.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e64fb963200b856cfe03faa7f1204826cdd23110a08fed9d84aabff92c5ea387.exe
Resource
win10v2004-20240508-en
General
-
Target
e64fb963200b856cfe03faa7f1204826cdd23110a08fed9d84aabff92c5ea387
-
Size
1.5MB
-
MD5
1fedae07e7c7a058b9df5031a6ca261a
-
SHA1
9a4e03aa114f6e65a7f114812bf91f717fc74bc3
-
SHA256
e64fb963200b856cfe03faa7f1204826cdd23110a08fed9d84aabff92c5ea387
-
SHA512
4d32763bb9d5bef1d5af248ee5d0f88dc8544c39b4e83a31f2ea555ea7fe6b7568bf391acbd237f90ae8ffba532d07bbcf98d8a2ab2bbd36ad3e87255b48e3f8
-
SSDEEP
24576:hAPSJg6Wh6tviZuFqm4Pjl6CcAFiyTunyjfOnJkM5lopxQ+CMtRsK4iVHS6:aKM/vPxhTy6
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e64fb963200b856cfe03faa7f1204826cdd23110a08fed9d84aabff92c5ea387
Files
-
e64fb963200b856cfe03faa7f1204826cdd23110a08fed9d84aabff92c5ea387.exe windows:4 windows x86 arch:x86
4997774c757de72469000bc53538514b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
GetStartupInfoA
GetCommandLineA
GetTimeZoneInformation
GetSystemTime
GetLocalTime
TerminateProcess
HeapSize
GetACP
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
GetVersionExA
HeapDestroy
HeapCreate
LCMapStringA
LCMapStringW
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetTickCount
InterlockedExchange
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetShortPathNameA
GetStringTypeExA
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalFlags
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetFullPathNameA
GetTempFileNameA
GetFileAttributesA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GlobalAlloc
lstrcmpA
GetCurrentThread
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
SetLastError
lstrcpynA
FormatMessageA
LocalFree
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedIncrement
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
CloseHandle
GetLastError
Sleep
ExitProcess
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualProtect
VirtualAlloc
FreeLibrary
VirtualFree
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
GetEnvironmentVariableA
InterlockedDecrement
user32
MessageBeep
CharUpperA
GetDCEx
LockWindowUpdate
SetCapture
RegisterClipboardFormatA
SetParent
PostThreadMessageA
InsertMenuA
SetRect
WindowFromPoint
KillTimer
SetTimer
LoadStringA
GetSysColorBrush
LoadCursorA
PtInRect
GetClassNameA
MapDialogRect
SetWindowContextHelpId
ShowOwnedPopups
PostQuitMessage
IsZoomed
InflateRect
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
BringWindowToTop
InvalidateRect
UnpackDDElParam
ReuseDDElParam
SetMenu
DestroyMenu
GetDesktopWindow
SetCursor
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
GetMenuCheckMarkDimensions
LoadBitmapA
GetNextDlgGroupItem
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
LoadIconA
PostMessageA
SendDlgItemMessageA
MapWindowPoints
GetMenuStringA
PeekMessageA
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
IsWindowVisible
SendMessageA
EnableWindow
UpdateWindow
GetClientRect
GetSubMenu
LoadMenuA
IsWindowEnabled
ReleaseCapture
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
CopyAcceleratorTableA
CharNextA
DestroyIcon
DeleteMenu
GetMenuState
GetMenuItemID
TrackPopupMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetDlgItem
GetWindowLongA
GetParent
DestroyWindow
CreateDialogIndirectParamA
GetSystemMetrics
IsWindow
SetActiveWindow
GetActiveWindow
EndDialog
GetNextDlgTabItem
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindow
SetForegroundWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
GetSysColor
gdi32
Escape
GetMapMode
PatBlt
SetRectRgn
CombineRgn
CreateRectRgnIndirect
CreateFontIndirectA
DPtoLP
ExtTextOutA
GetTextMetricsA
GetTextColor
GetBkColor
LPtoDP
TextOutA
RectVisible
PtVisible
CreatePatternBrush
GetWindowExtEx
GetViewportExtEx
GetDeviceCaps
CreateRectRgn
DeleteObject
GetTextExtentPoint32A
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetSaveFileNameA
GetFileTitleA
GetOpenFileNameA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
GetFileSecurityA
RegQueryValueA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegSetValueA
RegOpenKeyExA
SetFileSecurityA
RegDeleteValueA
shell32
ExtractIconA
DragQueryFileA
DragFinish
SHGetFileInfoA
comctl32
ord17
ImageList_Destroy
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CoRegisterMessageFilter
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoInitialize
CoCreateInstance
OleRun
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
olepro32
ord253
oleaut32
VariantInit
VariantCopy
SysFreeString
SysAllocString
VariantChangeType
SysAllocStringByteLen
SysAllocStringLen
VariantTimeToSystemTime
SysStringLen
GetErrorInfo
VariantClear
Sections
.text Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.1MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ