General

  • Target

    c44f2de85e187b553a852f04bc8a0bfa90b3f2922a0285ecb6aa1ddd02d1ec3e

  • Size

    1.3MB

  • MD5

    eb266c2184ce54df6de7bc37512bdb8f

  • SHA1

    11ec1aeeafeac75f75cc159c92f7e2162f25e4ed

  • SHA256

    c44f2de85e187b553a852f04bc8a0bfa90b3f2922a0285ecb6aa1ddd02d1ec3e

  • SHA512

    3cf5568c63c6b0201497155513c9459b6c273dc7ca1cffcb756911a7eec7656a70a930986451bba4c5f51c6d27f176d5eca323ad22f83b3b2f7ca1d548d9d35e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c44f2de85e187b553a852f04bc8a0bfa90b3f2922a0285ecb6aa1ddd02d1ec3e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections