General

  • Target

    2872-1-0x0000000010000000-0x0000000010017000-memory.dmp

  • Size

    92KB

  • MD5

    c74cb519e4309827099161b7f1ea7959

  • SHA1

    75f98e033100376c794d542dacea09a80e6702a9

  • SHA256

    b2154116841434955923b3399510172e96c6b4f77fe08bca32f8c4a25830b721

  • SHA512

    398be85cfcb647edfd29eca87d266e35aaeb8128c6f08762802a3c0da413221838be69dafdf37238a48ab412afc0080f0802644578638ca0c753cbd654e572b6

  • SSDEEP

    1536:uFeqajGayQBKTiGInFFkFp5jlbqRiIKjNvhYCn5:8eqaYQBK21FsxqSvGi5

Score
10/10

Malware Config

Extracted

Family

gh0strat

C2

182.42.105.12

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2872-1-0x0000000010000000-0x0000000010017000-memory.dmp
    .dll windows:4 windows x86

    1ae82a4d4caa410fb57bfdd08dc07755


    Headers

    Imports

    Exports

    Sections