General

  • Target

    c2c30ce28decb614028d4790ce1b7d2207ae64c886ba5758ea5694db5bb87837

  • Size

    59KB

  • MD5

    0b82b73c4ede5e932429d13390e10986

  • SHA1

    be0e935bd6df7e56ffb2b7969fb9bd30751e6411

  • SHA256

    c2c30ce28decb614028d4790ce1b7d2207ae64c886ba5758ea5694db5bb87837

  • SHA512

    51116fc201a8b14398cad13d55c6fa1c5d30f346379e423d860e9efba10735760ea77c8b46d752e9b9987a45f30eed96737a552cb77cdf88f6cdeeb226785141

  • SSDEEP

    768:gWqBI8kDsasSqzV7hhyEmtq4Z32QSXM34vlgfo2ZxbrSxrglgpohKxvoPz4Z/jfN:gWYk1qzVdhmM4ZkMSQR5SV+bhy7Z/h

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c2c30ce28decb614028d4790ce1b7d2207ae64c886ba5758ea5694db5bb87837
    .exe windows x86


    Code Sign

    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections