General

  • Target

    c71e36baf2ffe06f74a303ae522f32b2f692432dc8ee70eb89f72a5279120a64

  • Size

    39KB

  • MD5

    cd8633d0e121745d11eebbe4229d091f

  • SHA1

    2a7d35891fba5e44ad198fd77fda5b28f1c7a4dc

  • SHA256

    c71e36baf2ffe06f74a303ae522f32b2f692432dc8ee70eb89f72a5279120a64

  • SHA512

    aa3aa41ff5d48df8b5657afd5d72ea6773af85fb926d364cc21558a43c16cf60b3f8be986b1094f3de7b954c33ead1d64b152e54f75de7c9848015d044a7d4cc

  • SSDEEP

    768:9Txhl9A0GT6ItvqDPddWpnsMFlCLd1RgM9lRixvX6nlJfUCnh+nw:L+6ItWdesXL/WIlRixSn7l

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c71e36baf2ffe06f74a303ae522f32b2f692432dc8ee70eb89f72a5279120a64
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections