General

  • Target

    c4cf13e1f6e2adc7e22c92402d8ebfe7bc0a41a061f4a91e59fdd463abaa6e23

  • Size

    1.3MB

  • MD5

    ca04636fa6cfd4e0c71fada007027c00

  • SHA1

    72c044d1b6a7e557faffe0c87a7d1e59c44f5eae

  • SHA256

    c4cf13e1f6e2adc7e22c92402d8ebfe7bc0a41a061f4a91e59fdd463abaa6e23

  • SHA512

    25fabd0b51e103d265d3a153b86c3adf5d095026cf372016e621697837f79fd000270e5e7f8d50b9017c8138cb4c1e6c54c9eae02cf7e9a2d459a92e17f8fd4e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c4cf13e1f6e2adc7e22c92402d8ebfe7bc0a41a061f4a91e59fdd463abaa6e23
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections