General

  • Target

    d4c3a41f69ae4351ef45cf7ef12f5e6fb549d17c82f6c035b50ee22dee1be0f4

  • Size

    149KB

  • MD5

    03ed16629a2a197bf19490f2d8217147

  • SHA1

    ae067327e4a5a9a37b5d3cc40684195d1869a012

  • SHA256

    d4c3a41f69ae4351ef45cf7ef12f5e6fb549d17c82f6c035b50ee22dee1be0f4

  • SHA512

    e69248721b4bd6406ca6aca87e34d9fde97fd9919e2e5effe0941f2e44781f3f34263d292f571a72a25817aae2576bd544fe402a3e294a7dae0d2a3f9c8e9fce

  • SSDEEP

    3072:P2T7uCWOhANdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KJiCbmN:PW7uCWOh4pl2GkGMkSgb8Svlu5KJON

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d4c3a41f69ae4351ef45cf7ef12f5e6fb549d17c82f6c035b50ee22dee1be0f4
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections