General

  • Target

    b893f8ab7e8b72e4f6f9a72f580f4db0e2927de9e6c2a0524381368bf4f00be9

  • Size

    1.3MB

  • MD5

    f0e2333c33efe67085353d6d474708ae

  • SHA1

    2aae86919df61983f8acc0024e88c1af591abdd7

  • SHA256

    b893f8ab7e8b72e4f6f9a72f580f4db0e2927de9e6c2a0524381368bf4f00be9

  • SHA512

    a15587a4427af6da65d4c630ff4ec2ceb9d8f39406f24c68643b5b4b2ef8670719cb4943421f03a8000bcf359734776577e27fcba52ae510621b3b95e9ab4ccf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b893f8ab7e8b72e4f6f9a72f580f4db0e2927de9e6c2a0524381368bf4f00be9
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections