General

  • Target

    b5a89e7a9e4066df8f0730363c8ef3360bf4b0faa74c95e7b7d042b26f43e5fa

  • Size

    1.3MB

  • MD5

    9bd969a8d7dc4eb727164f2f94eeb975

  • SHA1

    bc21a11b54a097e9f72942d54632f2789ab39f51

  • SHA256

    b5a89e7a9e4066df8f0730363c8ef3360bf4b0faa74c95e7b7d042b26f43e5fa

  • SHA512

    b2f6a80ceb94d8f9b9e8eee8a424008c1dc0eac94d8821ff1e895a75860047c1bd75a0e8614d7573203ab3cc5030fdd2c411a29f560604c5a2aad6c52c6061ff

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b5a89e7a9e4066df8f0730363c8ef3360bf4b0faa74c95e7b7d042b26f43e5fa
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections