General

  • Target

    2b4b2b72c715967cfb4c6a3ecab2daf0b46f91d2b81c05145a207819707a3fa0

  • Size

    1.3MB

  • MD5

    14cc53ca24317a68dce9e246289dcda3

  • SHA1

    211d04f7f61b34a864f8954557fe5a6d11273abf

  • SHA256

    2b4b2b72c715967cfb4c6a3ecab2daf0b46f91d2b81c05145a207819707a3fa0

  • SHA512

    f10b3aa32e2804043a6ed5a70d05acbac5999d05cfa27717b15e619aafe9dcf73a4d025cca8c6789e5f861d91160bd82977d29fb1f5fafb35fb4eabc6713ef0b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 2b4b2b72c715967cfb4c6a3ecab2daf0b46f91d2b81c05145a207819707a3fa0
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections