MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 49fe889b5081ebb969a26d2eecab566c2ccad3972ee21513fe61994110267714. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments

SHA256 hash: 49fe889b5081ebb969a26d2eecab566c2ccad3972ee21513fe61994110267714
SHA3-384 hash: d341e070697e102563a50470c212f4f53829627e8c167a6d49c3026e7ecad5783190579349d1b7e51954a6bff2b7e83a
SHA1 hash: 8b190233cba587ba6ea0f33931808f71680966bc
MD5 hash: 7ff45c97d89778aebf8d0f41a48527f5
humanhash: coffee-william-item-batman
File name:7ff45c97d89778aebf8d0f41a48527f5.exe
Download: download sample
Signature Gh0stRAT
File size:57'405 bytes
First seen:2022-11-08 06:25:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e58ab46f2a279ded0846d81bf0fa21f7 (7 x Nitol, 5 x Gh0stRAT, 3 x ZeuS)
ssdeep 768:WiuuULGFeOwBH5UQNY9fzu7/mqFBPkLe1+ETbfyXrLEyqUbAju/SfpqrZA/c89c:pRUaFevZUQC9C7OWBckWxbAKKfu+vc
Threatray 50 similar samples on MalwareBazaar
TLSH T12543F1D987626C44ECC305B10796237B66C6CB6CCB3E1B394E5D4E5EBC022A07B47A6C
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter abuse_ch
Tags:exe Gh0stRAT


Avatar
abuse_ch
Gh0stRAT C2:
183.236.2.18:8084

Intelligence


File Origin
# of uploads :
1
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7ff45c97d89778aebf8d0f41a48527f5.exe
Verdict:
Malicious activity
Analysis date:
2022-11-08 06:28:42 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file in the %temp% directory
Moving a file to the %temp% directory
Enabling the 'hidden' option for files in the %temp% directory
Moving a file to the Windows subdirectory
Creating a service
Replacing files
Launching a service
DNS request
Enabling autorun for a service
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GhostRat
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if browser processes are running
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)
Contains functionality to detect sleep reduction / modifications
Creates a Windows Service pointing to an executable in C:\Windows
Deletes itself after installation
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May modify the system service descriptor table (often done to hook functions)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
System process connects to network (likely due to code injection or exploit)
Uses dynamic DNS services
Yara detected GhostRat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 740622 Sample: jpxNkiEhsl.exe Startdate: 08/11/2022 Architecture: WINDOWS Score: 100 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus detection for dropped file 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 6 other signatures 2->38 7 jpxNkiEhsl.exe 1 3 2->7         started        11 svchost.exe 1 2->11         started        14 svchost.exe 2->14         started        16 9 other processes 2->16 process3 dnsIp4 22 FastUserSwitchingC...bilityex.dll (copy), PE32 7->22 dropped 24 C:\Users\user\AppData\Local\...\release.tmp, PE32 7->24 dropped 26 C:\Users\user\AppData\...\dll.tmp (copy), PE32 7->26 dropped 40 Contains functionality to change the desktop window for a process (likely to hide graphical interactions) 7->40 42 Checks if browser processes are running 7->42 44 Creates a Windows Service pointing to an executable in C:\Windows 7->44 46 Contains functionality to detect sleep reduction / modifications 7->46 28 wltt.3322.org 183.236.2.18, 49697, 49700, 8084 CMNET-GUANGDONG-APChinaMobilecommunicationscorporation China 11->28 48 System process connects to network (likely due to code injection or exploit) 11->48 50 Found stalling execution ending in API Sleep call 11->50 52 Deletes itself after installation 11->52 54 Changes security center settings (notifications, updates, antivirus, firewall) 14->54 18 MpCmdRun.exe 1 14->18         started        30 192.168.2.1 unknown unknown 16->30 56 Query firmware table information (likely to detect VMs) 16->56 file5 signatures6 process7 process8 20 conhost.exe 18->20         started       
Threat name:
Win32.Infostealer.OnlineGames
Status:
Malicious
First seen:
2011-05-31 21:18:00 UTC
File Type:
PE (Exe)
AV detection:
36 of 41 (87.80%)
Threat level:
  5/5
Result
Malware family:
gh0strat
Score:
  10/10
Tags:
family:gh0strat persistence rat
Behaviour
Checks processor information in registry
Suspicious behavior: LoadsDriver
Drops file in System32 directory
Deletes itself
Loads dropped DLL
Drops file in Drivers directory
Sets DLL path for service in the registry
Sets service image path in registry
Gh0st RAT payload
Gh0strat
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
253c4ba6298bcea804d91dd83d285816de8d6811dc2af156e4970bd396fedde4
MD5 hash:
0d6d8c92239de95ce61a0e0ac5dcf1dc
SHA1 hash:
7f617845aee5eabfa2a48c48c79bf359b51edfea
SH256 hash:
4d89f35054fefde8b93c6ff57c1f31ae68136c4f3a6a0ee278ef2ae7cf34b8de
MD5 hash:
cf4e83c8c8b2022be68d64383271b025
SHA1 hash:
80c3f4d4ac38ab03192bdcc548facd5076f2e95f
SH256 hash:
49fe889b5081ebb969a26d2eecab566c2ccad3972ee21513fe61994110267714
MD5 hash:
7ff45c97d89778aebf8d0f41a48527f5
SHA1 hash:
8b190233cba587ba6ea0f33931808f71680966bc
Malware family:
Gh0st RAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:meth_get_eip
Author:Willi Ballenthin

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments