General

  • Target

    5a6de50017a9f276d0007e488dc012ab4dcd6dc40749665b85fe17a4262c10fa

  • Size

    1.3MB

  • MD5

    b4279ee4454164c7bbea8c821378bfa9

  • SHA1

    28f91bff3659f5e3262ad37cb1c7b71ef429798d

  • SHA256

    5a6de50017a9f276d0007e488dc012ab4dcd6dc40749665b85fe17a4262c10fa

  • SHA512

    5c2375fd0ee381d4c07a745de6e1ab78cbf57122a81eeaa6e1c8a3b9b3f3989d7a8c6670cf6cca6aa4798dc3aeefdb27620982d86931140f5a4570f2886c4f71

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 5a6de50017a9f276d0007e488dc012ab4dcd6dc40749665b85fe17a4262c10fa
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections