General

  • Target

    a46ded9a18e44a4c3942c52d4e7c23285fa21ec2e188a2148757603b83a7bd13

  • Size

    1.3MB

  • MD5

    f2ea2abc63f0e229ac09dd3e4fdcd9a3

  • SHA1

    7dff1a3d1990c9908fef0ecb747591c07ab782c8

  • SHA256

    a46ded9a18e44a4c3942c52d4e7c23285fa21ec2e188a2148757603b83a7bd13

  • SHA512

    e717fe81f77feb7e558ef6d3a4a624a2b0c39d8cb013e6b8eea6653297879d33880ef47fa2ce0a86cb49f75796c59dc5505ea5c784546ba58f965f4bfaafc7a2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a46ded9a18e44a4c3942c52d4e7c23285fa21ec2e188a2148757603b83a7bd13
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections