General

  • Target

    1da6eb48ed595ba064af3e77f0e0fbbf8063ec1e54969cee5f877daa5f007f83

  • Size

    1.3MB

  • MD5

    3010f80bd36e752643c07cef63217746

  • SHA1

    a64fe70f2465826401515f68b9431381e8c715c5

  • SHA256

    1da6eb48ed595ba064af3e77f0e0fbbf8063ec1e54969cee5f877daa5f007f83

  • SHA512

    4e8f646c2b37df942b0ef42f716ccb3cbfc483e060c08a80202c2db4200a5366a1c89db17d3bc15af7c975bba2163fdbb279f88f2f5cf569bf0523b2ad74053c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 1da6eb48ed595ba064af3e77f0e0fbbf8063ec1e54969cee5f877daa5f007f83
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections