MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1c60192be3d193617aadd61be5be552a5b24e46e50492b04eb889ed1f6fbd81d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Gh0stRAT
Vendor detections: 7
| SHA256 hash: | 1c60192be3d193617aadd61be5be552a5b24e46e50492b04eb889ed1f6fbd81d |
|---|---|
| SHA3-384 hash: | edccaf425aff6830a43ed03c6d48eab146739a167f0667b0b2203b5df1aea5c0faec4c3315728f6e20e6bda20f09dbb9 |
| SHA1 hash: | dafeecac1988de92d55095d5c7cbe6cd8ccda7e9 |
| MD5 hash: | 46fdc4b60fb66337835940cf1d1d91f0 |
| humanhash: | missouri-emma-seventeen-two |
| File name: | 点击安装{纸飞机}简体中文语言包.exe |
| Download: | download sample |
| Signature | Gh0stRAT |
| File size: | 4'114'243 bytes |
| First seen: | 2022-05-16 12:58:02 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1ff847646487d56f85778df99ff3728a (4 x RedLineStealer, 3 x Nitol, 2 x Gh0stRAT) |
| ssdeep | 98304:Q06FOznLo0+Dd6uxcQnTTgWz/Z0ipvsEcCG+gp8o5nZL:Q3F6n80W6uGQnTPXhk+gph5nh |
| Threatray | 23 similar samples on MalwareBazaar |
| TLSH | T1B7162303F792C0B1E4AA00B805664A724E76BE724B69D5E3ABD07D5EAD703D0F73254B |
| TrID | 68.5% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 10.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 9.2% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4) 3.6% (.EXE) Win64 Executable (generic) (10523/12/4) 2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | dc39333333353536 (1 x Gh0stRAT, 1 x MimiKatz) |
| Reporter | |
| Tags: | exe Gh0stRAT RAT |
Intelligence
File Origin
# of uploads :
1
# of downloads :
236
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
点击安装{纸飞机}简体中文语言包.exe
Verdict:
No threats detected
Analysis date:
2022-05-16 23:34:46 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a window
Sending a custom TCP request
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CheckCmdLine
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
greyware obfuscated overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
GhostRat, Mimikatz, Nitol
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Disables UAC (registry)
Drops executables to the windows directory (C:\Windows) and starts them
Hides threads from debuggers
Machine Learning detection for dropped file
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected GhostRat
Yara detected Mimikatz
Yara detected Nitol
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Farfli
Status:
Malicious
First seen:
2022-04-24 00:53:02 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
17 of 26 (65.38%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 13 additional samples on MalwareBazaar
Unpacked files
SH256 hash:
e1bb0e92daa3a318c91af5da3f2cbb5e9259c380975be7d97fc310a2f409320e
MD5 hash:
e65a756180339ce63e6ff5e38ceab58c
SHA1 hash:
d24a5f4ea399a9ddb8090ac80bb3a6f256c988bf
SH256 hash:
1921cd22f1895c3b4026d3bc48304060dffde503652ae05b6487c4ce9c361c13
MD5 hash:
2c5b9088e194d48ac9c09287528c59c2
SHA1 hash:
1a540300f30761f71a999f3a4e440b2d68a13801
SH256 hash:
4d1b75481750c4a16471a56c0dfdd25995a9f7e40799ba461bd03aa6e618bb7d
MD5 hash:
95957edaec494f1b21e03ab079e84327
SHA1 hash:
a672bb320ebf81e598f1aa5badd3378310f0f017
SH256 hash:
1c60192be3d193617aadd61be5be552a5b24e46e50492b04eb889ed1f6fbd81d
MD5 hash:
46fdc4b60fb66337835940cf1d1d91f0
SHA1 hash:
dafeecac1988de92d55095d5c7cbe6cd8ccda7e9
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.