General

  • Target

    f69b0f6580e0810ca1f34e4e954b0e96cf47cbb1a6e0d6b5498dbfb2b825dc70

  • Size

    1.3MB

  • MD5

    30792b48c912b4213429ec5e9d96b7a0

  • SHA1

    64be8939e9d82ef74141b832a0359a23c085a835

  • SHA256

    f69b0f6580e0810ca1f34e4e954b0e96cf47cbb1a6e0d6b5498dbfb2b825dc70

  • SHA512

    d974a6e3474c12f2c117a939961faf8c72ce067e1374800c8f1f374978ad5566e3f4d0326505d6ba43a4abf36b84fa16f917dd449dd3800f0478e16c76421661

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • f69b0f6580e0810ca1f34e4e954b0e96cf47cbb1a6e0d6b5498dbfb2b825dc70
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections