General

  • Target

    e542c71ff80e9d6e6f419330be0f6e4d30e417d6215a93bf46e0e833e2e551c5

  • Size

    1.3MB

  • MD5

    f9b6b3bcfc50d64ee9212ec7230f6352

  • SHA1

    cea0740ac44ed46d126cf50ca4a4c797b0c9fdb1

  • SHA256

    e542c71ff80e9d6e6f419330be0f6e4d30e417d6215a93bf46e0e833e2e551c5

  • SHA512

    45db318ee184c29ca34a4749530498a9b42dd6b4e8fcde267e9b1dc0530140603bb602e0249a11f2c40b16dcf36b959ee7399898972cd28d73b1b2af337a1eb8

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e542c71ff80e9d6e6f419330be0f6e4d30e417d6215a93bf46e0e833e2e551c5
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections