General

  • Target

    732eae4c7b7ffd607596f0804530c1e617dc6d7f37f3b6ecc722f273e090ef42

  • Size

    370KB

  • MD5

    a374a417822d4f392abd314bde85b630

  • SHA1

    b3f0dcdcd0188de2c90f29acd57b272d7fea7813

  • SHA256

    732eae4c7b7ffd607596f0804530c1e617dc6d7f37f3b6ecc722f273e090ef42

  • SHA512

    8d4fab50da0b6597737f69236f05b835293ae9447a33989bc98f62e970030292c93a1ebc64bbbed3153280ae8dba8b99c98a78e10b46aa8ae5372b255683976b

  • SSDEEP

    3072:mxjMQVacnG3icUkYdT45/NEGI/Lc+EINkzT1diLUEuBfYcORtwikwiWAD:mxjlVJnQiGP/evc2gT1Wcx

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 732eae4c7b7ffd607596f0804530c1e617dc6d7f37f3b6ecc722f273e090ef42
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections