General

  • Target

    04492bb4f17e2041fca5df3b4b93cdd969ce1b08d4983e42db4568643e9ca4b2

  • Size

    404KB

  • MD5

    08e6989a36f177fbe5fbb7e0caa613bb

  • SHA1

    2f2989752ff266fb75b32f66bd955f706ae3ea1a

  • SHA256

    04492bb4f17e2041fca5df3b4b93cdd969ce1b08d4983e42db4568643e9ca4b2

  • SHA512

    b8257ae4afa889608a53cee79a06564bb412826cb7921cba98420d3f0f21f4b47f7c373a0ec2625dd3b60cec4f45dab0f4d3f872536a76bf53259f12c31407b8

  • SSDEEP

    3072:mxjMQVacnG3icUkYdT45/NEGI/Lc+EINkzT1diLUEuBfYcOR7taK8OwowiWAoO:mxjlVJnQiGP/evc2gT1WcC

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 04492bb4f17e2041fca5df3b4b93cdd969ce1b08d4983e42db4568643e9ca4b2
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections