General

  • Target

    b7d8b432271df910d44cb86459011d1d231d712e31c63c5848b74aa6a7ca4292

  • Size

    1.3MB

  • MD5

    aa52b70f76631e48cffc5daaad6c8191

  • SHA1

    6a3869d0f66f95e0772c61ea2e689c6c008aed15

  • SHA256

    b7d8b432271df910d44cb86459011d1d231d712e31c63c5848b74aa6a7ca4292

  • SHA512

    dfa82009ca2d77b31b70278a391620d0c254f925e0e06d1121030aadd1c1a19eb3041ed109eef1762f8ca40eadfbaf12b0237aeec89da86488f528c77af3e89f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b7d8b432271df910d44cb86459011d1d231d712e31c63c5848b74aa6a7ca4292
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections