General

  • Target

    ff0a4e333f518e6cffbb3c4d9a6e4467dacc00b0fe250d1baa998fcf9fc3f5f9

  • Size

    1.3MB

  • MD5

    18bf94b80ab466209bc48d328547c1aa

  • SHA1

    08b338810701696560a2c12d9c947210f3232fbf

  • SHA256

    ff0a4e333f518e6cffbb3c4d9a6e4467dacc00b0fe250d1baa998fcf9fc3f5f9

  • SHA512

    0cf3ec2d3135f9d55357ad4d8a1ca890cf3071e8dda4e76c8cab171ef8ae769e1f1a3891193b01fb0b670a6fc5e01db7d0924d055b7eed5f26229732d17bebda

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ff0a4e333f518e6cffbb3c4d9a6e4467dacc00b0fe250d1baa998fcf9fc3f5f9
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections