General

  • Target

    0bf6a7a2e9639a7e67480e3e3bfee2d2b80bf2cfddbaef334fb8d0c5f9b0aac3

  • Size

    1.3MB

  • MD5

    4ad19f141109a49c2661f54bf16866af

  • SHA1

    c39370bc8cd355beb5950d67e387b5ac2528e4de

  • SHA256

    0bf6a7a2e9639a7e67480e3e3bfee2d2b80bf2cfddbaef334fb8d0c5f9b0aac3

  • SHA512

    0c1e65db39ab4f78dc72023736651fd6148c5c0380d941d762a0fff5d689a74909b3784fd574270ea0c38dc103d17e7d91f212915de996629be99576fd2081d0

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 0bf6a7a2e9639a7e67480e3e3bfee2d2b80bf2cfddbaef334fb8d0c5f9b0aac3
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections