General

  • Target

    d65b2ff9dc7ebb7f9a8f883dad955a043f7aaf4509f7b0d570794e167f17be53

  • Size

    1.3MB

  • MD5

    cbd22c5b1806c005c02f6ea07a610b69

  • SHA1

    4948da59c9f98fb6e1363cfba3557b14685239fb

  • SHA256

    d65b2ff9dc7ebb7f9a8f883dad955a043f7aaf4509f7b0d570794e167f17be53

  • SHA512

    a9e12f6a9b4e7801025e6d10606227fda375c7dee59d1e7be34eb8c3cff3ea2625dbc0b1c677b11f335d07cf16def6a00be4f44076b5edcf1da9fcee0699fadb

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • d65b2ff9dc7ebb7f9a8f883dad955a043f7aaf4509f7b0d570794e167f17be53
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections