General

  • Target

    4972-135-0x0000000010000000-0x0000000010010000-memory.dmp

  • Size

    64KB

  • MD5

    aff04413bbfa17d4effc99984c8f6c5c

  • SHA1

    74ecee016f57c81a663bef3adfed88a1f5329ce1

  • SHA256

    95ce34ddd123a5fb6bf6a8582e2133324910bf53a18375c585b0333529005547

  • SHA512

    8e4f1d8f3020bb49a1eaba1052229cddb2378f552ee2bfc81fc3f6f3e393f2c6394ad6d12732e458c683c192c6d7f0079f438ab3f98ff5193a0ecfbce900f994

  • SSDEEP

    1536:bicV9vfa4gmiD7KKb+qqnu3/++ykvz5K28:LfakiD7xb+qqnuP++ye5K1

Score
10/10

Malware Config

Extracted

Family

gh0strat

C2

3005.qmananan.com

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family

Files

  • 4972-135-0x0000000010000000-0x0000000010010000-memory.dmp
    .dll windows x86

    55cc24a9cf98c16eeef7d7030b8008b1


    Headers

    Imports

    Exports

    Sections