MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69ada5ba27acac423073b251d25fc23b09e4d5127f879d07a0c4ae01366ce8a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 12 File information Comments

SHA256 hash: 69ada5ba27acac423073b251d25fc23b09e4d5127f879d07a0c4ae01366ce8a5
SHA3-384 hash: 96a655a674ea6986330c6c3ab521e651c4d490cd00ef3ce057fb4a65b9edaef38cebca0043273ba645f8faea3923e453
SHA1 hash: 45750a7677bc098b91aa316ba6f774244729a1a3
MD5 hash: 42ea177dfd4e10313fc9bdf44e7a44fb
humanhash: sad-steak-fix-tennis
File name:SecuriteInfo.com.Win32.RATX-gen.602.27469
Download: download sample
Signature Gh0stRAT
File size:1'326'080 bytes
First seen:2025-02-28 22:54:36 UTC
Last seen:2025-02-28 23:33:26 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash e30e290150c3ca110248a91d74c2af75 (1 x Gh0stRAT)
ssdeep 24576:jihcx7yXb5KisCrPoOjm4WPHZ5I6Cmd6qKIa1Z0:jiyxeXb0iNrM9HO1Z0
Threatray 8 similar samples on MalwareBazaar
TLSH T18155B00A2E9D0C298BA6D336C055E4E39CE9D795814F83E1DA88FBD90019653FCE61FD
TrID 32.2% (.EXE) Win64 Executable (generic) (10522/11/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4504/4/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter SecuriteInfoCom
Tags:dll Gh0stRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
336
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect
Result
Verdict:
Clean
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm fingerprint microsoft_visual_cc obfuscated packed packed packer_detected
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GhostRat, Mimikatz, Nitol
Detection:
malicious
Classification:
bank.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Checks if browser processes are running
Contain functionality to detect virtual machines
Contains functionality to access PhysicalDrive, possible boot sector overwrite
Contains functionality to automate explorer (e.g. start an application)
Contains functionality to capture and log keystrokes
Contains functionality to detect sleep reduction / modifications
Contains functionality to infect the boot sector
Creates an autostart registry key pointing to binary in C:\Windows
Delayed program exit found
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected GhostRat
Yara detected Mimikatz
Yara detected Nitol
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1626853 Sample: SecuriteInfo.com.Win32.RATX... Startdate: 28/02/2025 Architecture: WINDOWS Score: 100 28 Suricata IDS alerts for network traffic 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 5 other signatures 2->34 7 loaddll32.exe 1 2->7         started        9 rundll32.exe 2->9         started        11 rundll32.exe 2->11         started        process3 process4 13 rundll32.exe 1 7->13         started        16 cmd.exe 1 7->16         started        18 rundll32.exe 7->18         started        20 conhost.exe 7->20         started        signatures5 38 Found evasive API chain (may stop execution after checking mutex) 13->38 40 Found stalling execution ending in API Sleep call 13->40 42 Contains functionality to automate explorer (e.g. start an application) 13->42 44 9 other signatures 13->44 22 rundll32.exe 2 16->22         started        process6 dnsIp7 26 38.91.115.206, 49788, 49805, 49824 SPECTRUMLINKUS United States 22->26 36 System process connects to network (likely due to code injection or exploit) 22->36 signatures8
Threat name:
Win32.Trojan.FatalRAT
Status:
Malicious
First seen:
2025-02-28 21:54:45 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
19 of 38 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Adds Run key to start application
Blocklisted process makes network request
Unpacked files
SH256 hash:
9f4e614f8da2231e45d118ae81828e0dc85fb41d97635951bea5b6a8e58b7373
MD5 hash:
fb73bc2a9920af04fa6e0174c06bd04d
SHA1 hash:
1b95e4502086ea664dc454d9de67a8fdfe820c29
Detections:
Mimikatz_Strings INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess MALWARE_Win_Zegost MALWARE_Win_FatalRAT MALWARE_Win_PCRat check_installed_software
SH256 hash:
69ada5ba27acac423073b251d25fc23b09e4d5127f879d07a0c4ae01366ce8a5
MD5 hash:
42ea177dfd4e10313fc9bdf44e7a44fb
SHA1 hash:
45750a7677bc098b91aa316ba6f774244729a1a3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Armadillov1xxv2xx
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess
Author:ditekSHen
Description:Detects executables calling ClearMyTracksByProcess
Rule name:MALWARE_Win_FatalRAT
Author:ditekSHen
Description:Detects FatalRAT
Rule name:MALWARE_Win_PCRat
Author:ditekSHen
Description:Detects PCRat / Gh0st
Rule name:MALWARE_Win_Zegost
Author:ditekSHen
Description:Detects Zegost
Rule name:Mimikatz_Strings
Author:Florian Roth (Nextron Systems)
Description:Detects Mimikatz strings
Reference:not set
Rule name:Mimikatz_Strings_RID2DA0
Author:Florian Roth
Description:Detects Mimikatz strings
Reference:not set
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Trojan_Gh0st_ee6de6bc
Author:Elastic Security
Description:Identifies a variant of Gh0st Rat

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gh0stRAT

DLL dll 69ada5ba27acac423073b251d25fc23b09e4d5127f879d07a0c4ae01366ce8a5

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegOpenKeyA
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegSetValueExA

Comments