General

  • Target

    6c1e4f2f1c273a85c2e47a8d711432f6aaa301c0bcad5b95e07be8585d5f8c93

  • Size

    1.3MB

  • MD5

    d733485902566fcdbde9f4a641f4bd97

  • SHA1

    2a4f2f7da47c4a61123aab7ad87160db7683eeaf

  • SHA256

    6c1e4f2f1c273a85c2e47a8d711432f6aaa301c0bcad5b95e07be8585d5f8c93

  • SHA512

    0e938f3bec8c27d40ea0394ea237b63916af477d010e0b2c69fae9f3c721557a19f48b370a803846fea99fcaae2b7cb0d4860147a051905dafe7105a602dec3b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 6c1e4f2f1c273a85c2e47a8d711432f6aaa301c0bcad5b95e07be8585d5f8c93
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections