General

  • Target

    c3696a495682e0596f2cef84c0cc2050db2a6b1845a16cf23ce16b4c1c3d384b

  • Size

    1.3MB

  • MD5

    3a82df90bc435117b625675030fb0bd0

  • SHA1

    5261f60ff20319c3daf450763aa41e6c3c8209c2

  • SHA256

    c3696a495682e0596f2cef84c0cc2050db2a6b1845a16cf23ce16b4c1c3d384b

  • SHA512

    9a6a0c9444f61c0b585b250efce2e97ab4ff5990cd0189603d0929e1bfee2ac78cb572e61dd464d7b9bbbf09021e8f9bd7f67d6d2990ea02e0dc8ac9cdf09334

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c3696a495682e0596f2cef84c0cc2050db2a6b1845a16cf23ce16b4c1c3d384b
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections