General

  • Target

    a8c064e78f4a627d1c56d4233be56f88be0e8225608066b31c2b9976a0cd732f

  • Size

    1.3MB

  • MD5

    991ce96e7ff83958e74669f2632cb3ee

  • SHA1

    04f275e0fc96e9bba17d52af2e4038850f155a9e

  • SHA256

    a8c064e78f4a627d1c56d4233be56f88be0e8225608066b31c2b9976a0cd732f

  • SHA512

    d57126f13739de5b7857f30e6b4a8d4c864e19935bf54afa1869bbcc513f9d9b5f0c69e164bb2b8c7c48e74dd0e042336dfc521d5db77c7de2e4ae25c4429a23

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a8c064e78f4a627d1c56d4233be56f88be0e8225608066b31c2b9976a0cd732f
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections