General

  • Target

    04c337dc378e1f928dcfcc7df34808674a0c2dee28de0dae3467ae60d72426a1

  • Size

    1.3MB

  • MD5

    a8a8a2d8ef44e1d4caf31795c6777e03

  • SHA1

    d7eed5aefee94ea5f9a05b49a15f270111e48766

  • SHA256

    04c337dc378e1f928dcfcc7df34808674a0c2dee28de0dae3467ae60d72426a1

  • SHA512

    b4d184f923dfcbd5b7988ef460688591c60e12c367da2c8578a6928c18065ce681f2d4f840de5ae5d29809a27da70d385d2999d20b08917b39ca562ea9cb3e1b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 04c337dc378e1f928dcfcc7df34808674a0c2dee28de0dae3467ae60d72426a1
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections