MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 23ef608ba89c2fbd1efb63a893d5d44bfc72dace85a5940d88f81a75943093c3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 23ef608ba89c2fbd1efb63a893d5d44bfc72dace85a5940d88f81a75943093c3
SHA3-384 hash: 04be1b1da6d0ccc687d9be084f2be3ba93ab983294abf0204f8263bcb03c66bb531f481ac132efb90092d68753f58364
SHA1 hash: a2e9e50ed6382eb4c8dd7066ba90d729344c6049
MD5 hash: 6cff41751fbbbe8c1905bc47c00fbf01
humanhash: maine-winter-cat-venus
File name:23EF608BA89C2FBD1EFB63A893D5D44BFC72DACE85A5940D88F81A75943093C3.exe
Download: download sample
Signature Gh0stRAT
File size:1'481'728 bytes
First seen:2022-05-30 10:45:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ac722a3759de90678e7ce94002227e91 (1 x Gh0stRAT)
ssdeep 24576:nFf6KWcYpRPE+XqHR8vDKTPUyOrR8+lEVm5AkCcCS8fsUKWYWZMlZZnl:nQKGVE+PaPzO7EVEPnYsUKWwn
Threatray 2 similar samples on MalwareBazaar
TLSH T1ED6533C2968A52E5F0C413FE4920F756E5281101433FAB3366E6F50E957DBEDE0BA24B
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon aa3233cbcbcccc2a (1 x Gh0stRAT)
Reporter obfusor
Tags:exe Gh0stRAT RAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
312
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
23EF608BA89C2FBD1EFB63A893D5D44BFC72DACE85A5940D88F81A75943093C3.exe
Verdict:
No threats detected
Analysis date:
2022-05-30 10:49:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending an HTTP GET request
Creating a file
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Searching for the window
Launching a service
Sending a custom TCP request
Creating a file in the Windows subdirectories
Creating a service
Creating a process from a recently created file
Changing a file
Delayed writing of the file
Adding an access-denied ACE
Modifying a system executable file
DNS request
Launching the default Windows debugger (dwwin.exe)
Enabling autorun for a service
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug black packed wacatac
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GhostRat, Nitol
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Checks if browser processes are running
Contains functionality to modify Windows User Account Control (UAC) settings
Drops executables to the windows directory (C:\Windows) and starts them
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after checking mutex)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Performs DNS queries to domains with low reputation
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Uses known network protocols on non-standard ports
Yara detected GhostRat
Yara detected Nitol
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 636122 Sample: W4LV3PLu7o.exe Startdate: 30/05/2022 Architecture: WINDOWS Score: 100 37 Antivirus detection for dropped file 2->37 39 Antivirus / Scanner detection for submitted sample 2->39 41 Multi AV Scanner detection for dropped file 2->41 43 6 other signatures 2->43 6 zclxyy.exe 3 18 2->6         started        9 W4LV3PLu7o.exe 3 18 2->9         started        13 svchost.exe 9 1 2->13         started        15 4 other processes 2->15 process3 dnsIp4 49 Antivirus detection for dropped file 6->49 51 Multi AV Scanner detection for dropped file 6->51 53 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 6->53 63 6 other signatures 6->63 17 zclxyy.exe 18 6->17         started        29 www.hfsxiazai.xyz 154.219.129.115, 2044, 49773 DXTL-HKDXTLTseungKwanOServiceHK Seychelles 9->29 31 98.159.99.206, 49759, 49772, 49786 GORILLASERVERSUS United States 9->31 25 C:\Windows\SysWOW64\zclxyy.exe, PE32 9->25 dropped 27 C:\Windows\...\zclxyy.exe:Zone.Identifier, ASCII 9->27 dropped 55 Performs DNS queries to domains with low reputation 9->55 57 Found API chain indicative of sandbox detection 9->57 59 Checks if browser processes are running 9->59 61 Contains functionality to modify Windows User Account Control (UAC) settings 9->61 33 127.0.0.1 unknown unknown 13->33 35 192.168.2.1 unknown unknown 15->35 file5 signatures6 process7 file8 21 C:\Windows\SysWOW64\fwjfkq.exe, PE32 17->21 dropped 23 C:\Windows\...\fwjfkq.exe:Zone.Identifier, ASCII 17->23 dropped 45 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 17->45 47 Hides threads from debuggers 17->47 signatures9
Threat name:
Win32.Trojan.TrickBot
Status:
Malicious
First seen:
2022-05-30 06:56:37 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
a6a29c8b3eedf03ac0758ffbe5dda2ca5b34ff6a95ab8d1cd1929c8f002857a5
MD5 hash:
5b3e40b7251d30f9b349aef53ac563f6
SHA1 hash:
1bd4409ef19c44642822f76ccbd72571224169ab
SH256 hash:
9ee2a2337ddbc298914a41b4a5495ab329be164029f3943fcb09a548dbea11fa
MD5 hash:
8e1e97111bc8baa8acde5dd2506f2ff5
SHA1 hash:
e5109eb301cba2c9899e86bc8a66a251e40c4571
SH256 hash:
23ef608ba89c2fbd1efb63a893d5d44bfc72dace85a5940d88f81a75943093c3
MD5 hash:
6cff41751fbbbe8c1905bc47c00fbf01
SHA1 hash:
a2e9e50ed6382eb4c8dd7066ba90d729344c6049
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess
Author:ditekSHen
Description:Detects executables calling ClearMyTracksByProcess

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments