General

  • Target

    0b398eb2c8396702fdac5f2e1b2bcd7fb71ad1b31ba7e79adf1e2642fffcac22

  • Size

    1.3MB

  • MD5

    f5a475f08cd6d514696d0b85fc592b92

  • SHA1

    35f08374ab34363caa849f8543f1f0bafda3e5d5

  • SHA256

    0b398eb2c8396702fdac5f2e1b2bcd7fb71ad1b31ba7e79adf1e2642fffcac22

  • SHA512

    e080a387f24d940472f6b2a68a3c620cd65d396a933d7b95fd35284e01ceeca3d6f5458168e81b09a7171a428e889466418c4b498506086d1e4bfb0458a37220

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 0b398eb2c8396702fdac5f2e1b2bcd7fb71ad1b31ba7e79adf1e2642fffcac22
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections