General

  • Target

    e5c61956f699e7fd0b90c7bcee9a7464ce9be7b93710f3faf2e469d38260ff48

  • Size

    1.3MB

  • MD5

    8fd9e0c8e0fbcb7bd263e8a6c08a15a2

  • SHA1

    60cad467121c1c7687f92d7d729fe3e88008f81a

  • SHA256

    e5c61956f699e7fd0b90c7bcee9a7464ce9be7b93710f3faf2e469d38260ff48

  • SHA512

    a89c2d3ad70da2dd6616ddb99f3fc50fe8df3b0a74cd851ac53e12e23aaffa70f6c749ff3621494f2f88a3f4a27ebc49d79337fd631252e994d60f02b6280959

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e5c61956f699e7fd0b90c7bcee9a7464ce9be7b93710f3faf2e469d38260ff48
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections