General

  • Target

    cccd8200902edcdec8c3ae0385d4bd1c31d2f191d2de3674b09bb2617eec8197

  • Size

    488KB

  • MD5

    2ac6924468ad3f2f46f0a061c1732904

  • SHA1

    dae231c128e654937a759f927ccd8b92aa94e9bd

  • SHA256

    cccd8200902edcdec8c3ae0385d4bd1c31d2f191d2de3674b09bb2617eec8197

  • SHA512

    ebe2d37f2f4927dcb99899777f4baae092bb61a24ca6737a4a2cacffdd7c2df564d2df78c98d2a874d2b0e54dd8129ce4a23ec62a06867de50c292cbe1e8018f

  • SSDEEP

    3072:mxjMQVacnG3icUkYdT45/NEGI/Lc+EINkzT1diLUEuBfYcORNwiWAoSXtaoK8Oef:mxjlVJnQiGP/evc2gT1WcGHL

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • cccd8200902edcdec8c3ae0385d4bd1c31d2f191d2de3674b09bb2617eec8197
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections