General

  • Target

    c9a0fe5f41e62b06de69363b012cf56a6e6917973d4415a98fb072087774821c

  • Size

    1.3MB

  • MD5

    3d1789e67cf0b12d138f31654fb753f0

  • SHA1

    f1ee14cf1bd58e18c01e17c8579ee9dfa99f2d0d

  • SHA256

    c9a0fe5f41e62b06de69363b012cf56a6e6917973d4415a98fb072087774821c

  • SHA512

    b7afd90313fb2ddb2853413bfaa3a474ad391c83d6ac17822d877988df94508faf0445a97b557020a90cbb4248c6d0838f8061a2382a2bbab5633b3be8428000

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c9a0fe5f41e62b06de69363b012cf56a6e6917973d4415a98fb072087774821c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections