MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 14f381c0d75d7477de4bc89012f6916dcf1d373c4ebb23684baa73ddd3bef054. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Gh0stRAT
Vendor detections: 18
| SHA256 hash: | 14f381c0d75d7477de4bc89012f6916dcf1d373c4ebb23684baa73ddd3bef054 |
|---|---|
| SHA3-384 hash: | b437f7733574f598f3f5bcdb90cb69613e4684e4868ed91166c6177cff7ec8bad9c9377a0c96b17c73104d3bba1d82b9 |
| SHA1 hash: | c5b5bbc10b0901923bf13690d9e575b41d86ac59 |
| MD5 hash: | c51e84d4d53678605a1cb5feb6436c84 |
| humanhash: | dakota-stream-island-massachusetts |
| File name: | 1.exe |
| Download: | download sample |
| Signature | Gh0stRAT |
| File size: | 384'000 bytes |
| First seen: | 2024-06-12 11:28:21 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 92cbf1b7939e726b820cc211fce00750 (5 x Gh0stRAT) |
| ssdeep | 6144:ORjbUHOvGUNIE/FDjBazqjWgR+MSEtvlZTONpRGX5B4PY3mA0O0Gp8NhY5Jod:ejbh9tDjiuT+xEtl0u4w3mAZyxd |
| Threatray | 67 similar samples on MalwareBazaar |
| TLSH | T18D841210A4FE4C19C2C521700D2DAF8A6CBA50E52EB01C4FBEADFF765DF59D89028697 |
| TrID | 40.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 16.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 12.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 11.0% (.EXE) Win32 Executable (generic) (4504/4/1) 5.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe Gh0stRAT RAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
382
Origin country :
IDVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
14f381c0d75d7477de4bc89012f6916dcf1d373c4ebb23684baa73ddd3bef054.exe
Verdict:
Malicious activity
Analysis date:
2024-06-12 11:31:00 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
99.1%
Link:
Tags:
Execution Network Stealth Farfli
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the Windows subdirectories
Creating a service
Launching a service
Creating a process from a recently created file
Searching for synchronization primitives
Running batch commands
Creating a process with a hidden window
Сreating synchronization primitives
Creating a file in the drivers directory
Creating a window
Loading a system driver
DNS request
Connection attempt
Launching a process
Creating a file
Enabling autorun for a service
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
epmicrosoft_visual_cc farfli microsoft_visual_cc packed zusy
Verdict:
Malicious
Labled as:
Trojan.Farfli
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Hidden Rootkit
Verdict:
Malicious
Result
Threat name:
GhostRat, Mimikatz
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Self deletion via cmd or bat file
Snort IDS alert for network traffic
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected GhostRat
Yara detected Mimikatz
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.GhostRAT
Status:
Malicious
First seen:
2023-04-21 04:14:00 UTC
File Type:
PE (Exe)
AV detection:
33 of 36 (91.67%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 57 additional samples on MalwareBazaar
Result
Malware family:
purplefox
Score:
10/10
Tags:
family:gh0strat family:purplefox persistence rat rootkit trojan upx
Behaviour
Runs ping.exe
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Deletes itself
Executes dropped EXE
Loads dropped DLL
UPX packed file
Drops file in Drivers directory
Sets service image path in registry
Detect PurpleFox Rootkit
Gh0st RAT payload
Gh0strat
PurpleFox
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c1693173b9c6738f4c2f377acf7a3804431410857f0881e6fcbf1ad804bb8999
MD5 hash:
c626161fde88be001c9a75c538bb8a4a
SHA1 hash:
9885b917b4d3aeb73d3257770815f82e45803fd3
Detections:
check_installed_software
Mimikatz_Strings
Hidden
MALWARE_Win_PCRat
INDICATOR_TOOL_RTK_HiddenRootKit
potential_termserv_dll_replacement
SH256 hash:
94d4843e465dbc3848e41eb8c35fd838918ab11c44f5c87138222e07a7e31c62
MD5 hash:
d773675a2d9daf5110251355ac75d1a1
SHA1 hash:
110eb24442fea5a674ffa5618984632a3bf620fc
Detections:
Hidden
INDICATOR_TOOL_RTK_HiddenRootKit
SH256 hash:
b0e4be5ab0106b3547bd4c997e9affd916e99c202e855cee5ff9aa87e9e37f0a
MD5 hash:
f42911de75d64d94e2c6e916c212a686
SHA1 hash:
057b9bf7518dfe895649d5de9a8f3b6a075c4554
Detections:
Hidden
INDICATOR_TOOL_RTK_HiddenRootKit
SH256 hash:
14f381c0d75d7477de4bc89012f6916dcf1d373c4ebb23684baa73ddd3bef054
MD5 hash:
c51e84d4d53678605a1cb5feb6436c84
SHA1 hash:
c5b5bbc10b0901923bf13690d9e575b41d86ac59
Malware family:
Mimikatz
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Backdoor
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetCommandLineA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.