General

  • Target

    3008-134-0x0000000010000000-0x0000000010015000-memory.dmp

  • Size

    84KB

  • MD5

    aa3b881dc994c6c9623871522c00ce7f

  • SHA1

    c8cad6004ee1b8ba259abfc0e7b886d2ec5be33b

  • SHA256

    376d8e50d3d52f8084abe1ca56733d6bcd04db0ee5e2bc2d22b4af6333d457b1

  • SHA512

    757fde7079b27765a3ebde3a2c2574f3a02dd4228e7bfeb99c0480fc842d6d175dabdc8fe19561d13b799c8e92e28f517058a12d171abba5f405f3921721a20d

  • SSDEEP

    1536:iTsenhY8kwtuwL7hSm1Rh7IOdnToIfAUfeMGHE:SsEY8mwnhSqVTBfAUfKHE

Score
10/10

Malware Config

Extracted

Family

gh0strat

C2

81.68.216.37

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family

Files

  • 3008-134-0x0000000010000000-0x0000000010015000-memory.dmp
    .dll windows x86

    2221c0107b5e2205969c1e2018e65d34


    Headers

    Imports

    Exports

    Sections