General

  • Target

    e6ad5d6b1c57e8143f9216b48dc81f5784ead312c7b708d0d23fd5e564b11435

  • Size

    1.3MB

  • MD5

    8098f5993626164c21e444d0d42b1f5d

  • SHA1

    12a81ba926b3f0784fb4dce2fee49e90e938a65f

  • SHA256

    e6ad5d6b1c57e8143f9216b48dc81f5784ead312c7b708d0d23fd5e564b11435

  • SHA512

    5e2e8eead98cb42bd6642d2d99db086ed06befde69ba9ac41b106479dfb806b36f864dfa71897d45fdcf5f0d6ab52d6313e53dfda09545d3ff0cfb4ca995f71f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e6ad5d6b1c57e8143f9216b48dc81f5784ead312c7b708d0d23fd5e564b11435
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections