General

  • Target

    a8652c5eced40a10cdc671b29a2557999ab28fba9cbda73f0bd2b312ed4fb8c7

  • Size

    30KB

  • MD5

    569c81eb80c7a151291cdc3949b158e0

  • SHA1

    0676e07383daf2dd4f782558e2b16dfba8d51f6d

  • SHA256

    a8652c5eced40a10cdc671b29a2557999ab28fba9cbda73f0bd2b312ed4fb8c7

  • SHA512

    530a3b27c1fb0951529d71afd926efc1d00cd7c6f7235e868152c3eb81ab63d9bc76dbde2f0085bd6e10671b00dcec352e387eeb065606bf3bb061cc597162b1

  • SSDEEP

    384:MCSXAseXnOmkt3iBOJ1sdeLEXGFbulDfEnWrlU1mk+7CXONLkluKDUKDVKDNwgs:uDmkt311sd+EWFb6fEWZ8+UONLklQw

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • a8652c5eced40a10cdc671b29a2557999ab28fba9cbda73f0bd2b312ed4fb8c7
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections