General

  • Target

    c3d2071696a62f42a6c279c734c1a1776716a62aca68c7ee61e335407e5d4f2e

  • Size

    1.3MB

  • MD5

    c60fa79caff9ebd5bff738351ac10659

  • SHA1

    04137be938c4595c53f6dc574b1ff28e918cb54a

  • SHA256

    c3d2071696a62f42a6c279c734c1a1776716a62aca68c7ee61e335407e5d4f2e

  • SHA512

    2af628a0810ec5301822c9998be88ba6e6b4a48ce720ca4661a2935585d3fcedfd2577cade8a6db81ac1565e83bb9595d69cb7da7de4bcc50d30ba7462ba797b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c3d2071696a62f42a6c279c734c1a1776716a62aca68c7ee61e335407e5d4f2e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections