General

  • Target

    046c3f1be4ee0926fb4ceb10be0f63582f3c7884ee28c2fb094f6b4a42ca92cf

  • Size

    439KB

  • MD5

    f7b2403b8a6ee40476b7ed25012d0590

  • SHA1

    0ab9fa4724d1a0e7802beacdf8ad1e7a1501c3f7

  • SHA256

    046c3f1be4ee0926fb4ceb10be0f63582f3c7884ee28c2fb094f6b4a42ca92cf

  • SHA512

    95ec73fe469ccd999997d808bb1a1ecaac3a8262f3cdf2fa0dad7992e508c2b545594e0494b748bbd49846414d4f53f02726f07964c969daabd3b536534d35c2

  • SSDEEP

    3072:mxjMQVacnG3icUkYdT45/NEGI/Lc+EINkzT1diLUEuBfYcOR7itaoK8wU38oK8OG:mxjlVJnQiGP/evc2gT1Wcoe3P

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 046c3f1be4ee0926fb4ceb10be0f63582f3c7884ee28c2fb094f6b4a42ca92cf
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections