General

  • Target

    67d0ec69b7faadb59dc761c0d2708e6865e7f278cad1ecce6e3bc8f9f1f4396e

  • Size

    1.3MB

  • MD5

    a2bea4eb02a5e33e4bd0ee9ae9fc7535

  • SHA1

    08ef1378d92ea79e0608da214662022a3ca0a589

  • SHA256

    67d0ec69b7faadb59dc761c0d2708e6865e7f278cad1ecce6e3bc8f9f1f4396e

  • SHA512

    cf4f36b617d9f5aef3c9f74717b094ef8158c5376c49cbac85ac1a7880feed77180671dfb96ead48be3968ee33b0ae7a5494957c8e39ed2f464adb85367a3298

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 67d0ec69b7faadb59dc761c0d2708e6865e7f278cad1ecce6e3bc8f9f1f4396e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections