General

  • Target

    4ea5ae614aabc1a6b7420976dea5db17a2f526574e867e6156ea037a055961c0

  • Size

    1.3MB

  • MD5

    39c46f8e3269cf2a3c526acf641037c5

  • SHA1

    98263822d59352cbe3a48bbf4ff5a6265805cb1b

  • SHA256

    4ea5ae614aabc1a6b7420976dea5db17a2f526574e867e6156ea037a055961c0

  • SHA512

    d1eca652b5ed026f0f45cb6fdc34fa991145b04a8539402bd7b6c92efef38a761d1d13d82a128d621375b9ec67870281d915250b217cb360b8977593c5d59d76

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4ea5ae614aabc1a6b7420976dea5db17a2f526574e867e6156ea037a055961c0
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections