General

  • Target

    4db2ed51fb708303236469c24d3b6ae83766cfb61a7b7405136b7fa6e8f3f690

  • Size

    148KB

  • MD5

    818ea347be08d0549d7a580ed3b2f935

  • SHA1

    240d4e48a299d0871312eccc00279f3ae6b65873

  • SHA256

    4db2ed51fb708303236469c24d3b6ae83766cfb61a7b7405136b7fa6e8f3f690

  • SHA512

    20436231774d50dc26d2be2e8487622a739f198a887f73ee2cf6ba62f6a1b9b333737aa788831f41ef3daf3e32b92ff481c6a2c7208e7baca2c96a3369d30740

  • SSDEEP

    3072:9D0nN7yeSWORQtkdJv5hMFULTvtcMk8Lyji8lkivl05Kqi+ITqn:StyeSWORdJRG4GMkSQi8Tvl05KqDIen

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 4db2ed51fb708303236469c24d3b6ae83766cfb61a7b7405136b7fa6e8f3f690
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections