General

  • Target

    ccf944e609d8ad01c0e6edd5533c5bb2087df3be6ea98f6d56bca1b1e5a29d57

  • Size

    1.3MB

  • MD5

    465f1700d090833f2655c3fc86505ee5

  • SHA1

    f052c058907ebdcd38b7cb0cd07afdfef9ca36c8

  • SHA256

    ccf944e609d8ad01c0e6edd5533c5bb2087df3be6ea98f6d56bca1b1e5a29d57

  • SHA512

    82cc61020808f223c27fc09ab76ade7e8d8972d3c27cf48ce63881d0af7a09ca5a2fb4a459903a0e93867b73cd66d461412413b4d9ea7b79ac6e28ed04a43cd3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ccf944e609d8ad01c0e6edd5533c5bb2087df3be6ea98f6d56bca1b1e5a29d57
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections