General

  • Target

    1c38ea16df8084e702223e6dd3835ceaf2e5bc47a53c5aa9be907f0b70e6d474

  • Size

    1.3MB

  • MD5

    405f132815a7fea1fd0ced82eee3b971

  • SHA1

    2fc972f8622bcb2c403db74d63a50a7c4b828236

  • SHA256

    1c38ea16df8084e702223e6dd3835ceaf2e5bc47a53c5aa9be907f0b70e6d474

  • SHA512

    7f79c7e74db9512cbb85dbfd23110a2fa4555411c75daae84a391eac228fbd0b6dada0f3df35f183a42f432e7a188fcc2ab86d24339b68c01347815d30ef052a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 1c38ea16df8084e702223e6dd3835ceaf2e5bc47a53c5aa9be907f0b70e6d474
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections