General

  • Target

    cb5892e66ce5c2e7b5ab9946e77e1e634fdc5588a729ad6fdaaa4fd822f27051

  • Size

    1.5MB

  • MD5

    fae9be3b3ea035816b3f8649f51bbf77

  • SHA1

    baea3fae072e014881706ae7eee5bb766ef94374

  • SHA256

    cb5892e66ce5c2e7b5ab9946e77e1e634fdc5588a729ad6fdaaa4fd822f27051

  • SHA512

    43696b4169ddfe3ccff1a24d5850257cfd69b2c228af132649833d10c6a272e7030fa3fdab7a25d0890d92957f233cbe389c079d86c5fa2e3c825be5ed0ca69e

  • SSDEEP

    24576:tSnO3Wvw9Ngolr0kycTrNlFCatJFhfHni0NCXsFh74C/D0cG6OZU1:tNWvwsoh0HqNlBt9lC8Fh74QD0KX1

Score
10/10

Malware Config

Signatures

  • RunningRat payload 2 IoCs
  • Runningrat family

Files

  • cb5892e66ce5c2e7b5ab9946e77e1e634fdc5588a729ad6fdaaa4fd822f27051
    .rar
  • Gh0st.exe
    .exe windows x86

    656a9f5fe5a9b953f09fa0f8346e94e8


    Headers

    Imports

    Sections

  • Gh0st.ini
  • Install.dat
    .exe windows x86

    ae100eaf7a91030df326149b65c0e32a


    Headers

    Imports

    Sections

  • server.exe
    .exe windows x86

    ae100eaf7a91030df326149b65c0e32a


    Headers

    Imports

    Sections