General

  • Target

    6448f503c99f7f1339f5b0d6a0cbf0d7cab8362570557fca313d9b3b6b4dab0b

  • Size

    1.3MB

  • MD5

    34f526cbac09ad374b62cd9388f72861

  • SHA1

    da04f8ed4e06f37b3ce62792957c3d2c012e19fe

  • SHA256

    6448f503c99f7f1339f5b0d6a0cbf0d7cab8362570557fca313d9b3b6b4dab0b

  • SHA512

    5cf9dd51d9e74e75463206685088a62066630069787a22f067e4aaa092117b7c526e2a1c2778f05202a2b5729fa1d1fa48fda6d111f5dfa4cef7e74a8332d009

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 6448f503c99f7f1339f5b0d6a0cbf0d7cab8362570557fca313d9b3b6b4dab0b
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections