General

  • Target

    01535fcc23db13b820887b733b571ec2bfd1f14b3a41ab4c8ff7d1fcf1ab5be5

  • Size

    1.3MB

  • MD5

    e55cfb37b646b0dd620222cf9003f401

  • SHA1

    c7c11413c8385fe57f7a10b9bce5c4db207a70d1

  • SHA256

    01535fcc23db13b820887b733b571ec2bfd1f14b3a41ab4c8ff7d1fcf1ab5be5

  • SHA512

    37ba7a125440e40c7efad733f5a465f0de58eaac3a8aec38ad85439fe38e0ae5194a3a532cff8d2949e4605fb993b3b2331a3337a54b3e3d972e101ff8c9c80c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 01535fcc23db13b820887b733b571ec2bfd1f14b3a41ab4c8ff7d1fcf1ab5be5
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections