General

  • Target

    02c750c42c6d211753c94191ea02fdad960c2d4c575003b7c7a1c3df77b52939

  • Size

    1.3MB

  • MD5

    268a8ba4c0a45648ffb21ada8413805d

  • SHA1

    4d46699095da0e2f0233d1fb61f6add9d52ab999

  • SHA256

    02c750c42c6d211753c94191ea02fdad960c2d4c575003b7c7a1c3df77b52939

  • SHA512

    0b25efc597e26fa829226db2500abf375e1feb0d7d732e9576c09fb48ffcf8f63bee7949c7290318dd0e473ad21cc2bcac964cf7eaf8a8cde6ae26c1c2748fc1

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 02c750c42c6d211753c94191ea02fdad960c2d4c575003b7c7a1c3df77b52939
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections