General

  • Target

    d56eb7964d64884a3dc4915d2acc31ab44c99d6cbd6c41ad61e5e6f0c8b4bc74

  • Size

    1.3MB

  • MD5

    3e3aeb71dc90d3d2619df1c65e5d6e89

  • SHA1

    0d338ccc5d3e7c24c5ce1fd3e97fd1f85f932b33

  • SHA256

    d56eb7964d64884a3dc4915d2acc31ab44c99d6cbd6c41ad61e5e6f0c8b4bc74

  • SHA512

    9dbe407ded6322ed56f4eb47969ebf85919f6677b215f3f2e19cf1cca3eaaaad31723bd448c6aaacf6e9d1693d5111ce6952800b4100de2d43b104eade4ea812

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • d56eb7964d64884a3dc4915d2acc31ab44c99d6cbd6c41ad61e5e6f0c8b4bc74
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections