MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 09f5a7cf45a44e7f83caba21335bad806476b652d8c3f386bbe478323de208c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 1 File information Comments

SHA256 hash: 09f5a7cf45a44e7f83caba21335bad806476b652d8c3f386bbe478323de208c4
SHA3-384 hash: ed03222fb33df01dca315943478ff7f5be073a8f7fb01c5dc841f3f6decfde878ef123e41ba4a8e5d25f8a424e4a1281
SHA1 hash: 7367eaeadaaf4c1c8be70e3971e7cbdc725fde01
MD5 hash: 9fa2c1ea39caf46af63e1eac52de3737
humanhash: fillet-nebraska-neptune-apart
File name:09F5A7CF45A44E7F83CABA21335BAD806476B652D8C3F.exe
Download: download sample
Signature Gh0stRAT
File size:183'808 bytes
First seen:2022-04-04 11:22:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5c0b18ba6f84b2c3db400e2682d08bdc (1 x Gh0stRAT)
ssdeep 3072:T0SpUAZkfEFuA/cUVVT8d1jShWVp3jaEwhXzb5udp83/QsgmNq/NFa/bJWIjrVU/:PUAZuAlz+1+hWbafpud6ZV2N0/trVgso
Threatray 5 similar samples on MalwareBazaar
TLSH T13104124259C182B2E81B5B307D72EC3FF70ABC0947744B16A79ABC9739BB959343C521
File icon (PE):PE icon
dhash icon 70e8b2e0b2d4f071 (1 x Gh0stRAT)
Reporter abuse_ch
Tags:exe Gh0stRAT


Avatar
abuse_ch
Gh0stRAT C2:
183.236.2.18:512

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
183.236.2.18:512 https://threatfox.abuse.ch/ioc/488758/

Intelligence


File Origin
# of uploads :
1
# of downloads :
213
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a service
Creating a file
Moving a file to the Windows subdirectory
Сreating synchronization primitives
Launching a service
DNS request
Sending a custom TCP request
Enabling autorun for a service
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
hupigon packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to detect sleep reduction / modifications
Creates a Windows Service pointing to an executable in C:\Windows
Detected VMProtect packer
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Graftor
Status:
Malicious
First seen:
2011-06-21 04:50:00 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
bootkit persistence vmprotect
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Adds Run key to start application
Writes to the Master Boot Record (MBR)
Loads dropped DLL
Executes dropped EXE
Sets DLL path for service in the registry
VMProtect packed file
Unpacked files
SH256 hash:
05e9b20e9bfebd394bdca5243e7c3744b01e96644f876e4d93019f7e4e5c8296
MD5 hash:
e833235a1f2690c38a5be5ad205be52f
SHA1 hash:
028dc23511512e44e35c3297a066f33fa6f99cf4
SH256 hash:
ff818324449df5306deb20e5cba458bb80eabb773e4510a6eeea336d4b5c6ff5
MD5 hash:
815bae0f00fcf4196e130b72c7087439
SHA1 hash:
50024acddfa6ce174b1fe829b9d7d11d99037ca2
SH256 hash:
de6d0e6e7aa5b053e4332a5981656ae5941db911bd79569773e2004ebc4f8ece
MD5 hash:
010de73f238e473344c331f75314b7b6
SHA1 hash:
642994967449386495ae0b42239a42459f27bee9
SH256 hash:
09f5a7cf45a44e7f83caba21335bad806476b652d8c3f386bbe478323de208c4
MD5 hash:
9fa2c1ea39caf46af63e1eac52de3737
SHA1 hash:
7367eaeadaaf4c1c8be70e3971e7cbdc725fde01
Malware family:
ZxShell
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments