General

  • Target

    1f5a8b7c0414a7a3d0d26f313c3dda33cffe3a9a5806a67ddc6231b0031daf27

  • Size

    7.1MB

  • MD5

    7b58bc8d641ba125a3fc5ae9e50ccdbe

  • SHA1

    c142f6c3b0282723ed40a0bb06d9a03ee9e25230

  • SHA256

    1f5a8b7c0414a7a3d0d26f313c3dda33cffe3a9a5806a67ddc6231b0031daf27

  • SHA512

    ba1a6f3cdacc634c29013c87d748b7d1dff3768c8f1913d336832fc313db64cd96ff9687dab561461337d5855d54b681bb3f741b6e37ed209cf7ca3d1c2c7b69

  • SSDEEP

    196608:NPQ+qqmYO9xDbbDdHQbID5XTtYzM75pECSpwWlQPA:2+89BDpF5Cz+5k37

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • CryptOne packer 1 IoCs

    Detects CryptOne packer defined in NCC blogpost.

Files

  • 1f5a8b7c0414a7a3d0d26f313c3dda33cffe3a9a5806a67ddc6231b0031daf27
    .exe windows:4 windows x86 arch:x86

    f3cb9603d36d2013f38b6755dd6eab62


    Code Sign

    Headers

    Imports

    Sections