General

  • Target

    4ddd390142a02f7d2a202f5f9a2f19c19dc91d61c42c1dd30f5d2f013e42f5f4

  • Size

    1.3MB

  • MD5

    c27fe039d0ad3b33cbe780dc1aa7ce24

  • SHA1

    3f43fda4d0caf3bab370745c5ca1d958ee4306b2

  • SHA256

    4ddd390142a02f7d2a202f5f9a2f19c19dc91d61c42c1dd30f5d2f013e42f5f4

  • SHA512

    ee08a771787461b65c1b8a6a23b37d866fab047a788cd7d3b7e8146234a7579f50c6fe26474d220686d6e80cac2b6c5bfd40ef2d7bd81cdd5fce1ee35e5401ad

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4ddd390142a02f7d2a202f5f9a2f19c19dc91d61c42c1dd30f5d2f013e42f5f4
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections