General

  • Target

    0c5281ba03217a9e8c6827ba5836e0e401a9ffd0b39c90ed0fb23a01fcdc568d

  • Size

    1.3MB

  • MD5

    2bd933799ca73574bebe2f99ba0079c3

  • SHA1

    93cd185781caf11298fd8c0060a079f525759976

  • SHA256

    0c5281ba03217a9e8c6827ba5836e0e401a9ffd0b39c90ed0fb23a01fcdc568d

  • SHA512

    5f3e388b3f34b4c32f0f0ccdabeea58e7c52cde0dbe82345b98f75c907a87bd89f15f6584d1ca7c6858bd84f5c726f6565dd1ac782280f644747abc46721758a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 0c5281ba03217a9e8c6827ba5836e0e401a9ffd0b39c90ed0fb23a01fcdc568d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections