General

  • Target

    400b7820a5b59d2930123529da66f90abac250fcab5e22302559abacc71f1a9e

  • Size

    1.3MB

  • MD5

    41f42c7c3e920ee5229c5998c8d76a21

  • SHA1

    e638d0365782f0dc386e5b7324cbb930ef4d0842

  • SHA256

    400b7820a5b59d2930123529da66f90abac250fcab5e22302559abacc71f1a9e

  • SHA512

    4a455c88b4efd5c8f6917893947cb8204bf76e4f758dff795c44af77f4f98c58cbdd7e451f4d2b4bd294468696a8c779e93c5005bbfacc9969e3013eb89f6662

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 400b7820a5b59d2930123529da66f90abac250fcab5e22302559abacc71f1a9e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections