MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45ba685ea7d66e5c0ac91b4c19a11dad0dff029f56afd15e87f8553f30f72d27. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: 45ba685ea7d66e5c0ac91b4c19a11dad0dff029f56afd15e87f8553f30f72d27
SHA3-384 hash: ca944d5a6ae1a565e0ff01b4ec65a7960f8f9ca8a9f4299d5b0890f87a5b54d2c5447f3879cd85282dad3b03db979a14
SHA1 hash: 104bb8d627556b7a46017ffdee38e62a3198d8e0
MD5 hash: c75ea8dcb6d4bd86c8e44f7cca73dce8
humanhash: mike-nineteen-bluebird-table
File name:c75ea8dcb6d4bd86c8e44f7cca73dce8.exe
Download: download sample
Signature Gh0stRAT
File size:263'386 bytes
First seen:2023-02-28 14:40:07 UTC
Last seen:2023-06-13 19:29:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla)
ssdeep 6144:lhRN6bO4Mvrynyba1cm36eWRwd5B2jLAz3Dv15EkTt/qaB:l61VKeOQ5ELAzDjBTYaB
Threatray 12 similar samples on MalwareBazaar
TLSH T17244123412AA55BFE1828BB11AA6F975FBB5BBE13B4910073F8D3EEA7974413D001217
TrID 92.7% (.EXE) NSIS - Nullsoft Scriptable Install System (846567/2/133)
3.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
1.1% (.EXE) Win64 Executable (generic) (10523/12/4)
0.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
0.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 64dc9ea6a69e9c01 (1 x Gh0stRAT)
Reporter abuse_ch
Tags:exe Gh0stRAT


Avatar
abuse_ch
None C2:
58.221.57.142:7777

Intelligence


File Origin
# of uploads :
4
# of downloads :
215
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
c75ea8dcb6d4bd86c8e44f7cca73dce8.exe
Verdict:
Malicious activity
Analysis date:
2023-02-28 14:40:28 UTC
Tags:
installer trojan rat pcrat gh0st

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Сreating synchronization primitives
Launching a process
Creating a process from a recently created file
Creating a window
Searching for synchronization primitives
Searching for the window
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
farfli overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
GhostRat, Mimikatz, Nitol
Detection:
malicious
Classification:
bank.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Checks if browser processes are running
Contains functionality to automate explorer (e.g. start an application)
Contains functionality to capture and log keystrokes
Contains functionality to detect sleep reduction / modifications
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to infect the boot sector
Contains functionality to modify windows services which are used for security filtering and protection
Creates an autostart registry key pointing to binary in C:\Windows
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected GhostRat
Yara detected Mimikatz
Yara detected Nitol
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Farfli
Status:
Malicious
First seen:
2023-02-15 20:16:19 UTC
File Type:
PE (Exe)
Extracted files:
50
AV detection:
32 of 39 (82.05%)
Threat level:
  5/5
Result
Malware family:
gh0strat
Score:
  10/10
Tags:
family:gh0strat persistence rat
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Adds Run key to start application
Enumerates connected drives
Checks computer location settings
Executes dropped EXE
Gh0st RAT payload
Gh0strat
Unpacked files
SH256 hash:
31913b545d5634caaa1a8c8f6631fc795bdb063226360edd959d0e609bbfb270
MD5 hash:
2a21c07fbd78ce1f06c1a5f4f9696aa2
SHA1 hash:
ad4b952f5fa8e6b5a792d9d864da63b5bd5bbfc0
SH256 hash:
88148702bd2f7a446dbcc0c124ce78ade309402c208708e3ad95a965c8005ba1
MD5 hash:
e357f11c26513863a613723e12daae09
SHA1 hash:
90f9948420211207e438c9570e0a769a45732071
SH256 hash:
45ba685ea7d66e5c0ac91b4c19a11dad0dff029f56afd15e87f8553f30f72d27
MD5 hash:
c75ea8dcb6d4bd86c8e44f7cca73dce8
SHA1 hash:
104bb8d627556b7a46017ffdee38e62a3198d8e0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments