Report - 3306.exe

Gh0st RAT Malicious Packer PE File PE32
ScreenShot
Created 2021.06.16 08:54 Machine s1_win7_x6401
Filename 3306.exe
Type PE32 executable (GUI) Intel 80386, for MS Windows
AI Score
7
Behavior Score
3.6
ZERO API file : malware
VT API (file) 61 detected (malicious, high confidence, Magania, Trojanpws, Bjlog, Unsafe, Save, Dialer, FRJV, Baijin, Redosdru, dxwn, TrojanPSW, fjzikd, ~Z@k24gw, MulDrop1, Zegost, A + Troj, chek, ASBOL, KVM005, kcloud, PcClient, dxtx, score, Pbbot, BScope, ai score=82, GenAsa, d0AUU2BCWeI, Static AI, Malicious PE, susgen, confidence, 100%)
md5 369af7277751019de4e0a12b294d24de
sha256 3c536c1558eba42c1967d9732bf9afd25c9c3c28bfbdc0028b945e88f1141d90
ssdeep 3072:mtABk6W//OzY3qKz05HOScaZLCbnUvH6+gxF13+ea2rXYShBdj7ExxwXDGLOqPfC:GABk6W/M1KKRCXvlYShPYxxwHqPf1mI
imphash 07cd32fe06d43febfbbba5706c9ac01e
impfuzzy 48:r9Gx02GIXAh8+CbGR7TsOosY8C/rJlvzzm/Em/:ZGRGIXAh8+GuTsnsYHfvvm/Em/
  Network IP location

Signature (7cnts)

Level Description
danger File has been identified by 61 AntiVirus engines on VirusTotal as malicious
watch Installs itself for autorun at Windows startup
notice Creates a service
notice Expresses interest in specific running processes
notice Foreign language identified in PE resource
notice Searches running processes potentially to identify processes for sandbox evasion
info The executable uses a known packer

Rules (4cnts)

Level Name Description Collection
danger Gh0st_RAT_Zero binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info IsPE32 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

MSVCRT.dll
 0x40412c _controlfp
 0x404130 _strlwr
 0x404134 _strnicmp
 0x404138 _itoa
 0x40413c __set_app_type
 0x404140 __p__fmode
 0x404144 __p__commode
 0x404148 _adjust_fdiv
 0x40414c __setusermatherr
 0x404150 _initterm
 0x404154 __getmainargs
 0x404158 _acmdln
 0x40415c exit
 0x404160 _XcptFilter
 0x404164 _exit
 0x404168 ??1type_info@@UAE@XZ
 0x40416c strstr
 0x404170 strncpy
 0x404174 _CxxThrowException
 0x404178 __CxxFrameHandler
 0x40417c strcmp
 0x404180 ??3@YAXPAX@Z
 0x404184 memcpy
 0x404188 ??2@YAPAXI@Z
 0x40418c memset
 0x404190 strchr
 0x404194 strncat
 0x404198 strcat
 0x40419c tolower
 0x4041a0 toupper
 0x4041a4 _ftol
 0x4041a8 srand
 0x4041ac rand
 0x4041b0 strcpy
 0x4041b4 _except_handler3
 0x4041b8 strlen
 0x4041bc _stricmp
KERNEL32.dll
 0x404080 GetStartupInfoA
 0x404084 MultiByteToWideChar
 0x404088 GetLastError
 0x40408c CreateDirectoryA
 0x404090 GetFileAttributesA
 0x404094 lstrcpyA
 0x404098 lstrlenA
 0x40409c DeleteFileA
 0x4040a0 SetFileAttributesA
 0x4040a4 CloseHandle
 0x4040a8 Process32Next
 0x4040ac GetCurrentProcessId
 0x4040b0 Process32First
 0x4040b4 CreateToolhelp32Snapshot
 0x4040b8 GetTickCount
 0x4040bc lstrcatA
 0x4040c0 GetSystemDirectoryA
 0x4040c4 HeapFree
 0x4040c8 GetProcAddress
 0x4040cc GetModuleHandleA
 0x4040d0 HeapAlloc
 0x4040d4 GetProcessHeap
 0x4040d8 ExitProcess
 0x4040dc SetEnvironmentVariableA
 0x4040e0 GetWindowsDirectoryA
 0x4040e4 GetTempPathA
 0x4040e8 MoveFileA
 0x4040ec SetFileTime
 0x4040f0 WideCharToMultiByte
 0x4040f4 SystemTimeToFileTime
 0x4040f8 SetFilePointer
 0x4040fc WriteFile
 0x404100 CreateFileA
 0x404104 lstrcmpiA
 0x404108 GetModuleFileNameA
 0x40410c Sleep
 0x404110 WaitForSingleObject
 0x404114 CreateEventA
 0x404118 OpenEventA
 0x40411c SetUnhandledExceptionFilter
 0x404120 GetCommandLineA
 0x404124 LocalFileTimeToFileTime
USER32.dll
 0x4041d8 wsprintfA
ADVAPI32.dll
 0x404000 GetUserNameA
 0x404004 GetServiceKeyNameA
 0x404008 StartServiceA
 0x40400c ControlService
 0x404010 OpenSCManagerA
 0x404014 CreateServiceA
 0x404018 DeleteService
 0x40401c CloseServiceHandle
 0x404020 RegCreateKeyExA
 0x404024 RegSetValueExA
 0x404028 RegDeleteKeyA
 0x40402c RegDeleteValueA
 0x404030 RegQueryValueExA
 0x404034 RegEnumKeyExA
 0x404038 RegEnumValueA
 0x40403c RegOpenKeyExA
 0x404040 RegCloseKey
 0x404044 LookupAccountNameA
 0x404048 GetFileSecurityA
 0x40404c InitializeSecurityDescriptor
 0x404050 GetSecurityDescriptorDacl
 0x404054 GetAclInformation
 0x404058 GetLengthSid
 0x40405c InitializeAcl
 0x404060 GetAce
 0x404064 EqualSid
 0x404068 AddAce
 0x40406c AddAccessAllowedAce
 0x404070 SetSecurityDescriptorDacl
 0x404074 GetSecurityDescriptorControl
 0x404078 SetFileSecurityA
SHLWAPI.dll
 0x4041d0 SHDeleteKeyA
NETAPI32.dll
 0x4041c4 NetApiBufferFree
 0x4041c8 NetUserGetLocalGroups

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure