General

  • Target

    167be0f0c6d59e2a66fab65e420e4adcbba8f7396063d74abeca5dbe702d7931

  • Size

    1.3MB

  • MD5

    414b8feaa48d43b46af721dc35a7c1c7

  • SHA1

    1c0627594d73b019d09ac763e65599b002a2ab7e

  • SHA256

    167be0f0c6d59e2a66fab65e420e4adcbba8f7396063d74abeca5dbe702d7931

  • SHA512

    b1b96e923ac01be4f0d20dd7fc89550e1e8965b54bebff0dd7cffa0c8981e2242888e72d17e4a75e653e0ce5b2b629c3a37b9aafa591aae8ecb2a4bffff0a154

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 167be0f0c6d59e2a66fab65e420e4adcbba8f7396063d74abeca5dbe702d7931
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections