General

  • Target

    580f4eac865bffcf6f13d9cd4b79c1f57a8e95183ef0ac593d994fdfa36505d0

  • Size

    1.3MB

  • MD5

    c564d9916dad2422ac4caeabf46983a5

  • SHA1

    97efb8e9ef33c5e744d62fa12b2b8656d8ea26d5

  • SHA256

    580f4eac865bffcf6f13d9cd4b79c1f57a8e95183ef0ac593d994fdfa36505d0

  • SHA512

    720505eb7052a557be82438a5a6bf198b5eb43c366ec277d28f4a8d9e3ec407df61da29fcc75a222e25bcf027f7e781c12f97b9c9a16b88c1035e549c55dbb3b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 580f4eac865bffcf6f13d9cd4b79c1f57a8e95183ef0ac593d994fdfa36505d0
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections