General

  • Target

    7e0e05c7ebf82cfb22f20bdfb72cbb55dc8bc16bd7b0c1ca04798534145ce8c6

  • Size

    490KB

  • MD5

    1394019c46647c302514b06943d07f20

  • SHA1

    53e772ef32e2bd2a1d0ebd046ebf7e241b3c92bf

  • SHA256

    7e0e05c7ebf82cfb22f20bdfb72cbb55dc8bc16bd7b0c1ca04798534145ce8c6

  • SHA512

    b4d13bfae0464f97393efac04b8ae9603277213d0e25173be24ea7bf92e54aef3eed0cf564bb255b9e7d2d1dc3891a8ac4ef01524e547b1241f88b40711625ed

  • SSDEEP

    3072:mxjMQVacnG3icUkYdT45/NEGI/Lc+EINkzT1diLUEuBfYcORb0taoOqwiWAoy2Nq:mxjlVJnQiGP/evc2gT1WcgQF

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 7e0e05c7ebf82cfb22f20bdfb72cbb55dc8bc16bd7b0c1ca04798534145ce8c6
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections