General

  • Target

    roat.exe

  • Size

    2.0MB

  • MD5

    404c02b623519354464d28dc0ca603d3

  • SHA1

    0d004a547ad24f558c8845733a3c975b60e5806d

  • SHA256

    3900163fd89de58034a893e72448e0f823e2e3c676f93cf62ac65dcbf33bc5fa

  • SHA512

    76d4119138f8f0efebeaba2e5570b6b83efc461272d8c8244ff93d5e41eb0259bb198a2b8e3e2c1a684d39132c579a7dbd60ed75b6214ef10558940a58d193a7

  • SSDEEP

    49152:ubA3joHXCcnjW2493nxEsyCSo1U+Jpz5HU2TwVGq:ubTbW/0dCSG/bzJU2IT

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • roat.exe
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections