MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 795eaa68705bc7de86df67b899d98c9bf359e5173ed3a1544f1a721a0316fca6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 795eaa68705bc7de86df67b899d98c9bf359e5173ed3a1544f1a721a0316fca6
SHA3-384 hash: 16a796f69b951e4aac5ac6c2e8c5ce78a0cb37ed168a1085d69d0b4f06caf2202365e353bf051fc0f9d5ef011acebd94
SHA1 hash: 5e96ebe6628bff1c67254a524b593367780cd794
MD5 hash: aed17b7fdfbcbbb66f45783bf7753a81
humanhash: sweet-speaker-equal-king
File name:aed17b7fdfbcbbb66f45783bf7753a81.exe
Download: download sample
Signature Gh0stRAT
File size:1'822'406 bytes
First seen:2021-11-21 09:44:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash eeac73be37480fd144f387e3563a0f14 (13 x Gh0stRAT, 2 x N-W0rm, 1 x XRed)
ssdeep 24576:vQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVLOoWvWL0vbJ:vQZAdVyVT9n/Gg0P+WhoI2A0vbJ
Threatray 154 similar samples on MalwareBazaar
TLSH T12C85D166FA8140B1C129107004AB5B35DB759DB54E328F9BA75AFE0E7D72282A43723F
File icon (PE):PE icon
dhash icon 68d09c9e9ed8e070 (1 x Gh0stRAT)
Reporter abuse_ch
Tags:exe Gh0stRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aed17b7fdfbcbbb66f45783bf7753a81.exe
Verdict:
No threats detected
Analysis date:
2021-11-21 09:47:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the Windows subdirectories
Creating a service
Launching a service
Launching a process
Searching for the window
Creating a file
Enabling the 'hidden' option for recently created files
Creating a file in the drivers directory
Loading a system driver
Running batch commands
Creating a process with a hidden window
DNS request
Moving a file to the %temp% directory
Modifying an executable file
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Enabling autorun for a service
Infecting executable files
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware icedid keylogger overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Mimikatz
Detection:
malicious
Classification:
spre.bank.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Checks if browser processes are running
Contains functionality to detect sleep reduction / modifications
Creates a Windows Service pointing to an executable in C:\Windows
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Double Extension
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Mimikatz
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 525715 Sample: 7w2gV0mADU.exe Startdate: 21/11/2021 Architecture: WINDOWS Score: 100 64 hackerinvasion.f3322.net 2->64 72 Malicious sample detected (through community Yara rule) 2->72 74 Antivirus detection for dropped file 2->74 76 Antivirus / Scanner detection for submitted sample 2->76 78 8 other signatures 2->78 9 7w2gV0mADU.exe 19 2->9         started        13 TXPlatforn.exe 2->13         started        15 svchost.exe 2->15         started        17 13 other processes 2->17 signatures3 process4 file5 54 C:\Users\user\Desktop\HD_7w2gV0mADU.exe, PE32 9->54 dropped 56 C:\Users\user\AppData\Local\...\svchost.exe, PE32 9->56 dropped 58 C:\Users\user\AppData\Local\Temp\svchos.exe, PE32 9->58 dropped 62 15 other malicious files 9->62 dropped 92 Drops PE files with benign system names 9->92 94 Drops executable to a common third party application directory 9->94 96 Infects executable files (exe, dll, sys, html) 9->96 19 svchost.exe 1 1 9->19         started        23 svchos.exe 3 2 9->23         started        25 HD_7w2gV0mADU.exe 9->25         started        98 Antivirus detection for dropped file 13->98 100 Machine Learning detection for dropped file 13->100 102 Drops executables to the windows directory (C:\Windows) and starts them 13->102 27 TXPlatforn.exe 16 1 13->27         started        104 Checks if browser processes are running 15->104 106 Contains functionality to detect sleep reduction / modifications 15->106 60 C:\Windows\SysWOW64\                .exe, PE32 17->60 dropped 108 Changes security center settings (notifications, updates, antivirus, firewall) 17->108 30                .exe 17->30         started        32 MpCmdRun.exe 17->32         started        34 WerFault.exe 17->34         started        signatures6 process7 dnsIp8 48 C:\Windows\SysWOW64\TXPlatforn.exe, PE32 19->48 dropped 80 Antivirus detection for dropped file 19->80 82 Machine Learning detection for dropped file 19->82 36 cmd.exe 1 19->36         started        50 C:\Windows\SysWOW64\3793593.txt, PE32 23->50 dropped 84 Creates a Windows Service pointing to an executable in C:\Windows 23->84 39 WerFault.exe 23 9 25->39         started        66 hackerinvasion.f3322.net 103.45.186.94, 49720, 49721, 49724 CHINANET-LIAONING-DALIAN-MANCHINANETLiaoningprovinceDali China 27->66 68 192.168.2.1 unknown unknown 27->68 52 C:\Windows\System32\drivers\QAssist.sys, PE32+ 27->52 dropped 86 Sample is not signed and drops a device driver 27->86 41 conhost.exe 32->41         started        file9 signatures10 process11 signatures12 88 Uses ping.exe to sleep 36->88 90 Uses ping.exe to check the status of other devices and networks 36->90 43 PING.EXE 1 36->43         started        46 conhost.exe 36->46         started        process13 dnsIp14 70 127.0.0.1 unknown unknown 43->70
Threat name:
Win32.PUA.FlyStudio
Status:
Malicious
First seen:
2021-11-17 19:39:23 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Enumerates connected drives
Loads dropped DLL
Drops file in Drivers directory
Executes dropped EXE
Sets DLL path for service in the registry
Sets service image path in registry
Unpacked files
SH256 hash:
535f80c6f550ab5b3600b65ffffce1448fd34bb8fe7bcfac39eeb3fcd54013f8
MD5 hash:
53f8a595a534d83a8bb3d19b109f1ed9
SHA1 hash:
da39b00a08c8804fea4b5bbc16f73700a0ea9ff6
SH256 hash:
62954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
MD5 hash:
3b377ad877a942ec9f60ea285f7119a2
SHA1 hash:
60b23987b20d913982f723ab375eef50fafa6c70
SH256 hash:
795eaa68705bc7de86df67b899d98c9bf359e5173ed3a1544f1a721a0316fca6
MD5 hash:
aed17b7fdfbcbbb66f45783bf7753a81
SHA1 hash:
5e96ebe6628bff1c67254a524b593367780cd794
Malware family:
Mimikatz
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments