General

  • Target

    e70ac4a94dc3eb1ef5f53c91a94bb8cd4b55e2f034347d607795bb3f0e7db7ad

  • Size

    148KB

  • MD5

    19de6a71100ecfae622598bb43a38be7

  • SHA1

    ac5ad9e0d9a60b1d38218052838a0e5bee7f7f06

  • SHA256

    e70ac4a94dc3eb1ef5f53c91a94bb8cd4b55e2f034347d607795bb3f0e7db7ad

  • SHA512

    1db7a808ebd1a190467a0794060a91d2d74be0a3aa6fd3cb17c9a6f8be973a19cbc2d719e72742e8fa77c5a926064639446ce0f3dc88ef48d4101d858e052142

  • SSDEEP

    3072:9D0nN7yeSWORQtkdJv5hMFULTvtcMk8Lyji8lkivl05Khi+ITqn:StyeSWORdJRG4GMkSQi8Tvl05KhDIen

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e70ac4a94dc3eb1ef5f53c91a94bb8cd4b55e2f034347d607795bb3f0e7db7ad
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections