General

  • Target

    4b44225ff14e3c12c9d1ea6cce2ccd95be71820c155b448ba44fa74bbc2e07cc

  • Size

    1.3MB

  • MD5

    9cc61dbdca1f0edc3dfc8716867c79f9

  • SHA1

    35c178f0c45d6b6094724c0c4ec6c159bd0bf2e0

  • SHA256

    4b44225ff14e3c12c9d1ea6cce2ccd95be71820c155b448ba44fa74bbc2e07cc

  • SHA512

    ce3825068a49edd2c8f240661bd1566f3c477a4e3782de76e1a163debf8b2d6cbad54974ca688563a6e84c8ab244e0ca0124ada4286421e67cf5831ea56b3f1f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4b44225ff14e3c12c9d1ea6cce2ccd95be71820c155b448ba44fa74bbc2e07cc
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections