General

  • Target

    c9f426f53ea583ca7b3c6c2e9f4ea4768d273b802b0af6f365c987f0a7e2ba28

  • Size

    1.3MB

  • MD5

    920c1478e492730dc84b7d68a0b570c9

  • SHA1

    e16b5b8e21733647e6ab832ceaa9f258a1f1fee3

  • SHA256

    c9f426f53ea583ca7b3c6c2e9f4ea4768d273b802b0af6f365c987f0a7e2ba28

  • SHA512

    d0f03852f08fb9ea9e4fd6c0cca5e1b9c95b0a4096ed3e2caadb05310b2cbc0e44dac55351b7a05bac4d3e97695b732f717e9ffc0fa198031bc8be776f7d5d78

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c9f426f53ea583ca7b3c6c2e9f4ea4768d273b802b0af6f365c987f0a7e2ba28
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections