General

  • Target

    72cbcf6af9f7c04db3c856e17eee32f03d87dbea4bd16e380a6c82db649edb24

  • Size

    439KB

  • MD5

    fa7eab8817aaef3c3430a15846da8460

  • SHA1

    81e7b9eeb01d85238fa6dd88a5b45d398cb47459

  • SHA256

    72cbcf6af9f7c04db3c856e17eee32f03d87dbea4bd16e380a6c82db649edb24

  • SHA512

    f2dca7c08afead366a396b8aab33bdb7c1dccf4578d9a87cdf16429af7200e574f925232c248e26d4a5fe17bd30190440702a469c1119231f74c1338654e345c

  • SSDEEP

    3072:mxjMQVacnG3icUkYdT45/NEGI/Lc+EINkzT1diLUEuBfYcOR7itaoK8wU38oK8O0:mxjlVJnQiGP/evc2gT1Wcoe35

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 72cbcf6af9f7c04db3c856e17eee32f03d87dbea4bd16e380a6c82db649edb24
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections