General

  • Target

    bee0b32350449cb47b2e50e57e0e09fe146e58a765974db35aa07f0007c4bc76

  • Size

    1.3MB

  • MD5

    b17178a18de7b93baf3101cbc99cf7d7

  • SHA1

    c9f75c6d5f7fdea9a6f20dcc4a9e145e131732a9

  • SHA256

    bee0b32350449cb47b2e50e57e0e09fe146e58a765974db35aa07f0007c4bc76

  • SHA512

    d5def133e5dd848b9a40e98239b4611fe984a13a34c645dc4d2808e2d53ec49ba92c8b4289c2eb7c7e9e7e2d8823be3e6d82400326259a64d5dc146964bb03a5

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • bee0b32350449cb47b2e50e57e0e09fe146e58a765974db35aa07f0007c4bc76
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections