General

  • Target

    b4f0316be7e8223719d4cef4d0c2f055902ee7e63c9fb5bbb18110fde2a656b5

  • Size

    1.3MB

  • MD5

    aa546e8996f75b397e2137dd1f94f934

  • SHA1

    f521ea464bc0c1c28999c5fe867b6e8f49ac4ceb

  • SHA256

    b4f0316be7e8223719d4cef4d0c2f055902ee7e63c9fb5bbb18110fde2a656b5

  • SHA512

    87bb1daef4326c635d39890ea2fc2d07dc456a472eb094196dad5f38d8bed6e21f39aa3a8a4f82c165baa8b536116f15f6c032b80ddc8025a9b52987d176ba22

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b4f0316be7e8223719d4cef4d0c2f055902ee7e63c9fb5bbb18110fde2a656b5
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections