General

  • Target

    ba230aaad1d0ad5c3e66e976072c70ae1a6be3ebc1b978ec2592c0b0f67e0278

  • Size

    1.3MB

  • MD5

    20faf2442a757b54c17e0a19c1d64c12

  • SHA1

    872fccbc93371d4c31747abc0fd3c93892b3980a

  • SHA256

    ba230aaad1d0ad5c3e66e976072c70ae1a6be3ebc1b978ec2592c0b0f67e0278

  • SHA512

    d5d64ad7b19beca600d2ac1478fa0799ffadcfe935a5647a1d4d78b53bb8e5df5283b56aa339c9de8ba75e757ab45bd4bdfdd8f0dd947a054b4f85190e8c4655

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ba230aaad1d0ad5c3e66e976072c70ae1a6be3ebc1b978ec2592c0b0f67e0278
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections