General

  • Target

    9cbeec9e60273dd76a3dee752cfbcf6daf5fa54e4821946e84559dc49a0f0e47

  • Size

    1.3MB

  • MD5

    b0c42fe59b578fb9a7141627725a400f

  • SHA1

    a01f01622ad7d6ea15002da6a3db63fd87e4b346

  • SHA256

    9cbeec9e60273dd76a3dee752cfbcf6daf5fa54e4821946e84559dc49a0f0e47

  • SHA512

    3aed9a13195d4094a2d6bca2c8d8a0933ea3e29f03cf9a7ed677fe0a0328c3b4ffdf4a93a93b6b2b78c829de51febb47754164ab1c6a730e8427bfa96d8a40ca

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 9cbeec9e60273dd76a3dee752cfbcf6daf5fa54e4821946e84559dc49a0f0e47
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections