General

  • Target

    68a53872e5023c5a27e93630e9f3eb10682373e3f5eb27c3619d9e7482c24b39

  • Size

    1.3MB

  • MD5

    a545b121d5d07a6429773f223867bfa3

  • SHA1

    79e7a00efa147f75eda9c17ca9f9b8c569adce82

  • SHA256

    68a53872e5023c5a27e93630e9f3eb10682373e3f5eb27c3619d9e7482c24b39

  • SHA512

    b3e63beb7b48eb6ef8214b8d20747100c535616cb8884ca998ea2688e46f1e5fd52b12db9dc36f5dc4ecfc873c7d423316daf63e0b4af08fa7c2f2449d15496a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 68a53872e5023c5a27e93630e9f3eb10682373e3f5eb27c3619d9e7482c24b39
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections