General

  • Target

    4a9f3ed316860921dc92a02b1f0f370b711990708694384117187bc1328e966a

  • Size

    1.3MB

  • MD5

    dd3f5bd38f2c59b502c839bbc047510e

  • SHA1

    dfd4f47886a652f7caaa76e84e9ae62c526cbe53

  • SHA256

    4a9f3ed316860921dc92a02b1f0f370b711990708694384117187bc1328e966a

  • SHA512

    dd09e75c0f72ebd430f1588ef8d81e00fd4b02f8c3815b1c024a921b7bffafadc77d5b1e8163e6b61f2750c5240c67b9d485812191e9f843cd13bf0f002e6594

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4a9f3ed316860921dc92a02b1f0f370b711990708694384117187bc1328e966a
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections