General

  • Target

    6c9a4a42791a52e0a942037046a7c8d4f34f7c992b1302dcbaea25b7d100ebc4

  • Size

    1.3MB

  • MD5

    1136dc597f36094f0b9881fc894ea7a1

  • SHA1

    adaa7502ff1ec04107eab92f0f24ad3a26cd589f

  • SHA256

    6c9a4a42791a52e0a942037046a7c8d4f34f7c992b1302dcbaea25b7d100ebc4

  • SHA512

    9fbf7a4ec0ee767cead8a570c98ddc86d64cd7238dcdf484b21824799a6a7b2d69c95b01a0705094ddb898915f24a98009343017561ae809c02cc3f892e3524b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 6c9a4a42791a52e0a942037046a7c8d4f34f7c992b1302dcbaea25b7d100ebc4
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections