MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54c38dd45b15fdf50d89a4997981dd094ee633c59e7251b0e892ed15123d8f2f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 54c38dd45b15fdf50d89a4997981dd094ee633c59e7251b0e892ed15123d8f2f
SHA3-384 hash: 53634e0b279124c3f69479683f674a9259a9a8e69fb35ce1e0077b63c92bce9b2207843f780376089903051568cb091a
SHA1 hash: 32477b5ca114203f71510d9504d039d3487bd983
MD5 hash: 966441864adb9b1e717078e2ff5b6681
humanhash: mexico-muppet-georgia-august
File name:54C38DD45B15FDF50D89A4997981DD094EE633C59E7251B0E892ED15123D8F2F.exe
Download: download sample
Signature Gh0stRAT
File size:1'448'448 bytes
First seen:2022-05-30 10:50:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a554460165bd32740a329ac6f1febeb3 (1 x Gh0stRAT)
ssdeep 24576:QR4jTE6Fpl+KwKqgA+ifCo2LMgGAGWLPxzX6DuISEaLA06tV9wgl2Aiz8muE:QR2okpUKBqx3wggGAP5X6q/EUD2wgu
Threatray 2 similar samples on MalwareBazaar
TLSH T10365334A8769A251C0CF467E651CAE6C3C307CA0AE45DFDDA760FD9D0E30945E82E23E
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 40b062268840a810 (1 x Gh0stRAT)
Reporter obfusor
Tags:exe Gh0stRAT RAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
310
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
54C38DD45B15FDF50D89A4997981DD094EE633C59E7251B0E892ED15123D8F2F.exe
Verdict:
No threats detected
Analysis date:
2022-05-30 10:56:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a window
Sending an HTTP GET request
Creating a file
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Searching for the window
Launching a service
Changing a file
Creating a file in the Windows subdirectories
Delayed writing of the file
Creating a service
Creating a process from a recently created file
Modifying a system executable file
Adding an access-denied ACE
DNS request
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Enabling autorun for a service
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
AntidebugCommonApi
MeasuringTime
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GhostRat, Nitol
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if browser processes are running
Drops executables to the windows directory (C:\Windows) and starts them
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Performs DNS queries to domains with low reputation
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Uses known network protocols on non-standard ports
Yara detected GhostRat
Yara detected Nitol
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 636126 Sample: 8odmbeY91s.exe Startdate: 30/05/2022 Architecture: WINDOWS Score: 100 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected Nitol 2->36 38 4 other signatures 2->38 7 nupdqq.exe 16 2->7         started        10 8odmbeY91s.exe 2 17 2->10         started        14 svchost.exe 2->14         started        16 11 other processes 2->16 process3 dnsIp4 40 Antivirus detection for dropped file 7->40 42 Multi AV Scanner detection for dropped file 7->42 44 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->44 54 3 other signatures 7->54 26 www.hfsxiazai.xyz 154.219.129.115, 2044, 49773 DXTL-HKDXTLTseungKwanOServiceHK Seychelles 10->26 28 98.159.99.206, 49758, 49772, 8969 GORILLASERVERSUS United States 10->28 22 C:\Windows\SysWOW64\nupdqq.exe, PE32 10->22 dropped 24 C:\Windows\...\nupdqq.exe:Zone.Identifier, ASCII 10->24 dropped 46 Performs DNS queries to domains with low reputation 10->46 48 Tries to evade analysis by execution special instruction (VM detection) 10->48 50 Tries to detect virtualization through RDTSC time measurements 10->50 52 Changes security center settings (notifications, updates, antivirus, firewall) 14->52 18 MpCmdRun.exe 1 14->18         started        30 127.0.0.1 unknown unknown 16->30 file5 signatures6 process7 process8 20 conhost.exe 18->20         started       
Threat name:
Win32.Trojan.Staser
Status:
Malicious
First seen:
2022-05-30 06:11:52 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
f0efee88d75c30b879dd9f89ce2ec0551d3d7b2c1f920974481fd164fbd89fc9
MD5 hash:
42a54626278009e89e9fc24b131c04b2
SHA1 hash:
fb1851af6f2e8d18a6a3a3edfbce154c0c365182
SH256 hash:
c00c4eb4662fc4ea144e1eace9ed9e1729039edd81dd1bf4232a3d90a3ef5a8f
MD5 hash:
77dbb4940772d7717d6fc115a9614485
SHA1 hash:
5a0bf0f635fd1706a564bfd2495f0f1c65396947
SH256 hash:
54c38dd45b15fdf50d89a4997981dd094ee633c59e7251b0e892ed15123d8f2f
MD5 hash:
966441864adb9b1e717078e2ff5b6681
SHA1 hash:
32477b5ca114203f71510d9504d039d3487bd983
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess
Author:ditekSHen
Description:Detects executables calling ClearMyTracksByProcess

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments