General

  • Target

    4560d09be0e10077ac075217fcee511d5f1a6efbe61465bb62f02915a7e43cf0

  • Size

    1.3MB

  • MD5

    d1e9238765e5292afee37f0988edf926

  • SHA1

    3de9ed0d756c76f2c602dc01d425ca4d69256dda

  • SHA256

    4560d09be0e10077ac075217fcee511d5f1a6efbe61465bb62f02915a7e43cf0

  • SHA512

    0176a534da54f0afd1755a2e1c00f14f20a2b7aad6e58f4b7c27369a9344d903d3d6edb3eba8ab9b9d812fdae184d9ed3d9a78779381386a9ae83f9bd0552154

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4560d09be0e10077ac075217fcee511d5f1a6efbe61465bb62f02915a7e43cf0
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections