General

  • Target

    411e2e476c01eae283f4b5ae15a62ee40e5d0c73d0c90c3a28da6989eb2cd410

  • Size

    54KB

  • MD5

    30169ecef41fb4165812f7c4abe4e881

  • SHA1

    e938889f8540e9ab0608cbcc0eabb7d6452a11a0

  • SHA256

    411e2e476c01eae283f4b5ae15a62ee40e5d0c73d0c90c3a28da6989eb2cd410

  • SHA512

    d738ad67537e5cfed33f915d34a1711e3dc9277c86587f79aa92dc4abb4e056e72caea846510df07d6f041a36b6c9638d3cfab7686b0ca2fad550c4b9b479268

  • SSDEEP

    1536:IY5ZNAUp+pGtfaN5WY0xXwBvYcCC/mkWC:n5ZGO/svYcokW

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 411e2e476c01eae283f4b5ae15a62ee40e5d0c73d0c90c3a28da6989eb2cd410
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections