General

  • Target

    b4e3984e61759a7d273aeebaf7ba2da5b87fa8f06caa19061a4f5f999fbb1c16

  • Size

    1.3MB

  • MD5

    ea758a7b62d8b4fd1400faf3a6f0dc64

  • SHA1

    2450d2dafa1979255c5dd892e57052a5f0af111e

  • SHA256

    b4e3984e61759a7d273aeebaf7ba2da5b87fa8f06caa19061a4f5f999fbb1c16

  • SHA512

    acbc5581ed7e39c0890c95e5169d5fa0b77aad99e7cf6eff75bdd2faabb4f4957eead38d50e3a8c0f407d41720a78f0b814f926018b95d9fb211433b095958ee

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b4e3984e61759a7d273aeebaf7ba2da5b87fa8f06caa19061a4f5f999fbb1c16
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections