General

  • Target

    16715e670e65c8098786bbd201c4a9632fa9d74b1f555d1c1b38051d01013ca4

  • Size

    1.3MB

  • MD5

    140995e5f2c88e63de3899741c54b802

  • SHA1

    3cc4aa3397e21358d7c178fce600b6d76230649c

  • SHA256

    16715e670e65c8098786bbd201c4a9632fa9d74b1f555d1c1b38051d01013ca4

  • SHA512

    541f6336e29ddd1e30f316e1053d5bd23185b5d65c9e158298727645292779266997d2c676ca55950d64ad46c88b13225e2ece754fea8b0f0fb09d5b9cab0ad5

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 16715e670e65c8098786bbd201c4a9632fa9d74b1f555d1c1b38051d01013ca4
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections