General

  • Target

    cbc497e4ecc82d3bde6c737a85624a211f57b49fbe72160aa85b9f348b185ac6

  • Size

    1.3MB

  • MD5

    b3904a5623f77bdb3fa8a9c0b3860f80

  • SHA1

    b9810da1f16d05f47c75b359c65d042ab7e263e9

  • SHA256

    cbc497e4ecc82d3bde6c737a85624a211f57b49fbe72160aa85b9f348b185ac6

  • SHA512

    7a6d17ceafadcc236716edbb64516c234bd4633ce36ecfd74c8de7185de3c9ce055a3923675cb8db3ce0bc6e01cb7a942afd69cb027e2b49ed62b9a77b8f2cd4

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • cbc497e4ecc82d3bde6c737a85624a211f57b49fbe72160aa85b9f348b185ac6
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections