General

  • Target

    64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf

  • Size

    1.3MB

  • MD5

    a8c7d8ed699333270d0d222d616ce16d

  • SHA1

    790b1deaaaba70335c152e793befac773b29a98f

  • SHA256

    64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf

  • SHA512

    804b712b6a06180b0588fc1f3b86f102cd3b8996e308df55f6ffb2ee7a6b31d7af5fab25d9344dde5a625e55a5a21f35b289495dddaf61f0c963c6d22f39c5fa

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 64895ecc0c028d0f060becb1239a1e6b52bb421623f5c6ef89150dc8e9832daf
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections