General

  • Target

    c4fa46b5aef148cf90e8a5cc839332851100ba00b9b4c9c9ad0c9cbf5f13634e

  • Size

    1.3MB

  • MD5

    3648fcb8ca37c5f47d5c9bc327417586

  • SHA1

    0bbb7685edf8da00970c71b9296e4d85a2a74b0e

  • SHA256

    c4fa46b5aef148cf90e8a5cc839332851100ba00b9b4c9c9ad0c9cbf5f13634e

  • SHA512

    bbeeb296c6a8c3d4a696ec49a2e456123b9cd12574587f98fa315c55ff81c3ee890d09e5e3a736e1b45554bcf024acaf709736aa5360b06711c4868c3d991a64

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c4fa46b5aef148cf90e8a5cc839332851100ba00b9b4c9c9ad0c9cbf5f13634e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections