General

  • Target

    ecb9ab059e10e549d7f70df1dc4461859f42d4619f35d34f0338bb6fdedda464

  • Size

    4.7MB

  • MD5

    b473e18da4d293b29ca9ee503260ca88

  • SHA1

    e977c8b624b563c8425918a52be443338cf6f4c3

  • SHA256

    ecb9ab059e10e549d7f70df1dc4461859f42d4619f35d34f0338bb6fdedda464

  • SHA512

    df07159ec849591c2b088a8e991c59d22c61697823a01cb7dab448f823450aa07322d77bca770216074de4dc539c4a6ea89a7cf8abc46f34cae54717063c6c27

  • SSDEEP

    98304:rIkhFDljzaplOtg1/xBf6G644mZAZPDruURxOuUOZ7va+VdqlUgJ4ZK7ceS:rIcBapsWFx8Gz43DtxOuPhvakUlUK7c5

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • NSIS installer 2 IoCs

Files

  • ecb9ab059e10e549d7f70df1dc4461859f42d4619f35d34f0338bb6fdedda464
    .rar
  • jksosetup.exe
    .exe windows x86

    77981b5ba545434d9901140945938c3a


    Code Sign

    Headers

    Imports

    Sections

  • 破甲下载者 V 5.0/再次修正随机命名的进程名改为系统进程名!.exe
    .exe windows x86

    8a16c42c9f4874151cd13c82b7061f43


    Headers

    Imports

    Sections

  • 破甲下载者 V 5.0/后门检测.txt
  • 破甲下载者 V 5.0/说明.txt