General

  • Target

    a8ea960538b73d0b1961313d7ba7118354411baaa907bb9dbaeccb9b5fcf3de6

  • Size

    1.3MB

  • MD5

    e0f3e1b20553ce143c1b773f50d7f419

  • SHA1

    49dd2f9a5da5f42b6a66ecfb6d0247eae6d246d2

  • SHA256

    a8ea960538b73d0b1961313d7ba7118354411baaa907bb9dbaeccb9b5fcf3de6

  • SHA512

    f1834e19beab0daba80913aa4402efde013d67c6f779eb34f667a79d08f2d28aa1794c2187d0e19b846f04042118f62b93f6cba9f4024d7aa57c03a808334127

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a8ea960538b73d0b1961313d7ba7118354411baaa907bb9dbaeccb9b5fcf3de6
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections