General

  • Target

    e637b26e6a5fe020c08f435e9a58846a00f3e23f9715ed0da66800c9abd2a3ee

  • Size

    158KB

  • MD5

    06b747c07ab845a977956ec62aaffce0

  • SHA1

    47f0b6f50a8866b5bd9b8f7b810b0d09602340b9

  • SHA256

    e637b26e6a5fe020c08f435e9a58846a00f3e23f9715ed0da66800c9abd2a3ee

  • SHA512

    e13640e26d21050fe22509c54332d19694ed627e649fc9b3c8ceda46c8aae2a9291f27fd7839345183e54755c27ea9591b93d4fe92244652d5f61e859886482c

  • SSDEEP

    3072:DoUGzRVHgCcnV5j9j0lvil2NnGfNGHqRy1zkeS1FpTa3q5tJH9Bt:LGzRxSVtp0l6whGfsKR+zkBpTaa5tJHd

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • e637b26e6a5fe020c08f435e9a58846a00f3e23f9715ed0da66800c9abd2a3ee
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections