General

  • Target

    300b0e6bedc885277491a53061650ea0e7caf3acf2241e9a944b69d2e45dc702

  • Size

    1.3MB

  • MD5

    c441d13cc4ca61d964c51dd1564341b9

  • SHA1

    56ede14693028765391d1f0eb3e89186ad8591d7

  • SHA256

    300b0e6bedc885277491a53061650ea0e7caf3acf2241e9a944b69d2e45dc702

  • SHA512

    db7dfbc6b28f5639067bec7c49ed39eea922215536c95fd61a10221064b6356cf151cfdb09ef1c363085595a495b1e318b6a171eeb4fcce01b3963eea6af053f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 300b0e6bedc885277491a53061650ea0e7caf3acf2241e9a944b69d2e45dc702
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections