General

  • Target

    5bcbdb83f011c4eac557e00bb71a32c6b0ac14c0ec27ffb3cf83e51e5b86e0bd

  • Size

    148KB

  • MD5

    005d3c033b9acb1e68c43fb7a20cd569

  • SHA1

    cd2b618ad25a4b41fe639c363fadebb0dbebdb08

  • SHA256

    5bcbdb83f011c4eac557e00bb71a32c6b0ac14c0ec27ffb3cf83e51e5b86e0bd

  • SHA512

    b370d3e5428a176288ec8e028bff5bb2b52ea3a9a5f99ebf1df7ad0cb44deff023562559eec25220207e0cabb1d7d76546cb7173686649d934c1c17ba04f5efd

  • SSDEEP

    3072:9D0nN7yeSWORQtkdJv5hMFULTvtcMk8Lyji8lkivl05KFQi+ITqn:StyeSWORdJRG4GMkSQi8Tvl05KODIen

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 5bcbdb83f011c4eac557e00bb71a32c6b0ac14c0ec27ffb3cf83e51e5b86e0bd
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections