General

  • Target

    c1c6a55c22cd309424a12f9735c9552011e86fe4cba9109a6e4b51961cc1274f

  • Size

    1.3MB

  • MD5

    daa719461751efec3a6f2997c49065c3

  • SHA1

    3ac90586dbf113ce89a64b5283466d3319155a95

  • SHA256

    c1c6a55c22cd309424a12f9735c9552011e86fe4cba9109a6e4b51961cc1274f

  • SHA512

    1609f9fc3cd183f0de7a2c56496e3ebfcd8d638d356df00aa408beb0796d762556d7b82e517de2e53988d231b8f3ed76091d78f8d15b33623a2675c44593176a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c1c6a55c22cd309424a12f9735c9552011e86fe4cba9109a6e4b51961cc1274f
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections