General

  • Target

    3c3c086a363527dc144c0d42c08c0a846a060c8ffa064c7defd26d295b78547d

  • Size

    1.3MB

  • MD5

    54e797aac1ba787069e81bfe2b47b788

  • SHA1

    af7e7df34cd0a4e927ea88a3e3e5ca1c6adc6a38

  • SHA256

    3c3c086a363527dc144c0d42c08c0a846a060c8ffa064c7defd26d295b78547d

  • SHA512

    db27684634f65ff9294b8d67848b1e1d8231ba17042114a1f03a186a8621b3c70d2b7c7580611efc95055b9a7a904450a66e3051867462189348d53458723cc6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 3c3c086a363527dc144c0d42c08c0a846a060c8ffa064c7defd26d295b78547d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections