General

  • Target

    30940bdf2c024b8cf24f3910ff0a654dabd9c08f577ed7ca455da92279fb769e

  • Size

    1.3MB

  • MD5

    0baf1c4294b3a195729e2888ec26a5c9

  • SHA1

    0a6628587f27a3a4b440b4061473cc3de4b42437

  • SHA256

    30940bdf2c024b8cf24f3910ff0a654dabd9c08f577ed7ca455da92279fb769e

  • SHA512

    c484c4bedff2fa0837a0f4925457dfefb72f846f5cf4557d578dc5f1599b7b3c9f96a47de8a8d0c5df414595a7da933a273b3dff63266a36e7232dab5e3d08f6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 30940bdf2c024b8cf24f3910ff0a654dabd9c08f577ed7ca455da92279fb769e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections