General

  • Target

    a2e1690e376542244c3c8f4d20f542469b7ce46d0de5a0ba9b9c1197b882aadd

  • Size

    1.3MB

  • MD5

    093a0f614f6d88c25906d40d88ea1cfd

  • SHA1

    f2fbfc4a4f3cf00f6d1c572280b7746010640e82

  • SHA256

    a2e1690e376542244c3c8f4d20f542469b7ce46d0de5a0ba9b9c1197b882aadd

  • SHA512

    dcc1f5f326d5a952c47a54d19f5bcacf077945fafe1bf8ca75723acc9ab1ba70642442bacce66a6a0d4481532d619cec32a4f5535737282ce26b834e787659cf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a2e1690e376542244c3c8f4d20f542469b7ce46d0de5a0ba9b9c1197b882aadd
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections