General

  • Target

    271c0c3e0f0cb72671e33143939f2bb0334f84098f0aa4b611d1bb5b206523cb

  • Size

    1.3MB

  • MD5

    886cd809b0e4988bac3fb7a6acd14510

  • SHA1

    cd35ff7bf89256ac0d8c4be244c70b1cca76f9b3

  • SHA256

    271c0c3e0f0cb72671e33143939f2bb0334f84098f0aa4b611d1bb5b206523cb

  • SHA512

    1cd0d1323c85e7c0140b6b085dbe1f94960debb488f1a2ded71a0531f21f33b136fe7906c0e5ad1f757ba2885771a44d131d882a601ff1732227b0087ffa8fef

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 271c0c3e0f0cb72671e33143939f2bb0334f84098f0aa4b611d1bb5b206523cb
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections