General

  • Target

    560b1dd451a1e67ce78c7ee6cc90d2c951c997e218e2afd0884071b20217f8db

  • Size

    1.3MB

  • MD5

    e1302f7440870a29820af53f2ffc6a64

  • SHA1

    08d7c02ecf465846559986d3047f09df1f32b8d6

  • SHA256

    560b1dd451a1e67ce78c7ee6cc90d2c951c997e218e2afd0884071b20217f8db

  • SHA512

    40e05c19b9968be4e2afb1d2159e329b6fdd3ef465c04f0c8b24b91911e4b4ff0b6bb86b2104074c0e197d3e91a552457dd194eb42d17cca009f7ad196d6da88

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 560b1dd451a1e67ce78c7ee6cc90d2c951c997e218e2afd0884071b20217f8db
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections