General

  • Target

    4bfa83f6fbee79fe71d58016921e9d49f071fb1e396da72fa7202a59f446142f

  • Size

    1.3MB

  • MD5

    d7d4f0f4304653ea4c4398d55b18ad72

  • SHA1

    c589000a8cdb3c6f1f136c604ac521f79ddc17c3

  • SHA256

    4bfa83f6fbee79fe71d58016921e9d49f071fb1e396da72fa7202a59f446142f

  • SHA512

    b77ba7d8f30b678566aa8268eec9ab609f3764557ae04c2155a210a4ba4d0180e458b4d4755772c552d602e0a59d2f9cd093b09afdaa74068d1e4e8c9ebd1a82

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4bfa83f6fbee79fe71d58016921e9d49f071fb1e396da72fa7202a59f446142f
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections