General

  • Target

    405c9e3cf4a6bf6ef91b2a0c976bf6589e12eef60dc9e02bab4f2a152ef220bf

  • Size

    1.3MB

  • MD5

    eea3a5b8bf7b452a1e0e7eb254702ea7

  • SHA1

    024f8bdd8f0360462894e6b6f1e990920cd43b1c

  • SHA256

    405c9e3cf4a6bf6ef91b2a0c976bf6589e12eef60dc9e02bab4f2a152ef220bf

  • SHA512

    10e9b899b96f0eb9d29ac5e7ae45ff0270b5ce333a1b01f32936788614f876a828c8b7a19e3aed85de624fee1d0b0a6fb2364cdd81d05c110ad476c94945346c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 405c9e3cf4a6bf6ef91b2a0c976bf6589e12eef60dc9e02bab4f2a152ef220bf
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections