General

  • Target

    4ea006a6589fba04dd27889a7a77cf9c44049c49033a37f3944af7d3f34f5b7c

  • Size

    1.3MB

  • MD5

    561e3dc4567cb625ca3167b356e189e2

  • SHA1

    8733c193ea250fbc4c7075d37ea498c6b4016068

  • SHA256

    4ea006a6589fba04dd27889a7a77cf9c44049c49033a37f3944af7d3f34f5b7c

  • SHA512

    26cd9ab80d7d0459c4ebae07f59d4a3c67bb31bf1a55bbfd55a3156803938a0cdb75ecaf79473a59d28b418ddb875be3568d3b19210fb2f2709d5d1abd73b08f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4ea006a6589fba04dd27889a7a77cf9c44049c49033a37f3944af7d3f34f5b7c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections