General

  • Target

    ecf7ab0a672922d77ec11f7a0e5e589cf3929f6f6e7ec6580d8901eb7c1ce332

  • Size

    1.3MB

  • MD5

    71f4c0cce8bcb8f260384caec831225c

  • SHA1

    940e0f6bd343188b3ed98d5c5af4b1fa7c2e18e5

  • SHA256

    ecf7ab0a672922d77ec11f7a0e5e589cf3929f6f6e7ec6580d8901eb7c1ce332

  • SHA512

    18446b68cebbe3a103c3b613ce09002f8195d6cf80614190684e83fae4c844fabfdf8fe9bce57b712e2b5175895343e7179796037df6ac56b85486c1ee5d0df1

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ecf7ab0a672922d77ec11f7a0e5e589cf3929f6f6e7ec6580d8901eb7c1ce332
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections