General

  • Target

    518b379a860479e0589e4a6773815d3093b6d5914fbb1372ff26d285e2050b98

  • Size

    1.3MB

  • MD5

    7a014be2212e4eae69bab3c8c5aa79ae

  • SHA1

    d8b24de9760f38483b0b3baac6c019871dc03873

  • SHA256

    518b379a860479e0589e4a6773815d3093b6d5914fbb1372ff26d285e2050b98

  • SHA512

    ace58cb93be65baa10f8aac0c1d3453aaa28e4c21b9aa9ac1b1a3563e11dc7c3718aa2d3b8e1cbecc64756b03ad7a040dbb08dac2add5b7b279edc84d6f9f4dd

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 518b379a860479e0589e4a6773815d3093b6d5914fbb1372ff26d285e2050b98
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections