General

  • Target

    c34ae828fec5900c652c5bfc9103e094f5273216721466f4b8c00e357e7d556c

  • Size

    155KB

  • MD5

    1bfeabfad2675509e7759c600db8d160

  • SHA1

    ca4465fe5870771d3e8b19faee0c0f79675a15fd

  • SHA256

    c34ae828fec5900c652c5bfc9103e094f5273216721466f4b8c00e357e7d556c

  • SHA512

    b222244fe239b025c15754ea22d5bc43b0195b8ba84bad53c31481e24b501b1b5ebd0ec1ab6a656fdc68260c60681f22fbd307706d65d043933cb95ea5bdc121

  • SSDEEP

    3072:c8B+NA/eWgSDwAcywtnmN4v0PWJVtPfqu51k4HIN:j+GmlLCN+JJVtPfquo4HIN

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c34ae828fec5900c652c5bfc9103e094f5273216721466f4b8c00e357e7d556c
    .dll windows x86


    Headers

    Exports

    Sections