General

  • Target

    4bae3ba62d8b1ac6859ab9f127f9f4fbe6b7bd5309102c543c8a930dccd1916b

  • Size

    1.3MB

  • MD5

    5d576f17af110c842e02ac34d62659e8

  • SHA1

    a9b352eac6b4c4beb42000b97a175416c2288f72

  • SHA256

    4bae3ba62d8b1ac6859ab9f127f9f4fbe6b7bd5309102c543c8a930dccd1916b

  • SHA512

    6b9b7e296fe346719dd1e815feb959f0b9e14b973e74dccc3e50aff6f9348512c6835337c5664d43eefa2c9e9a706fcba7ad028a5e3b793baca8e1c93d88e4b2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4bae3ba62d8b1ac6859ab9f127f9f4fbe6b7bd5309102c543c8a930dccd1916b
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections