General

  • Target

    39c1c714c3e921bab3a10f058443d4e0b6fc64beb9738f87a03eb8b9d452627d

  • Size

    1.3MB

  • MD5

    fd8cd2d77c0594e4b01f1785bcea6e9b

  • SHA1

    748289ef961702064dba79c157cabe58580c5c14

  • SHA256

    39c1c714c3e921bab3a10f058443d4e0b6fc64beb9738f87a03eb8b9d452627d

  • SHA512

    dd900d724b39a629ea1a86a510589cbcdd24c7c4a53b45941fe1c1fb0b4b8baf6b453a35cf58c06346116fe81eef5b3e7caaaf5ffdb86bc654c2a703233c86d2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 39c1c714c3e921bab3a10f058443d4e0b6fc64beb9738f87a03eb8b9d452627d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections