General

  • Target

    714cd3ff0c2a5dc06b47af93dc3eae2dd2bb16092ea4733b46f2bea8b844e98c

  • Size

    1.3MB

  • MD5

    2fc345502fbf6b6e7547f9247f13686b

  • SHA1

    794e15938beb4c0e7af04da44156824ab819fbab

  • SHA256

    714cd3ff0c2a5dc06b47af93dc3eae2dd2bb16092ea4733b46f2bea8b844e98c

  • SHA512

    760c043a6600ea3243fbaa06f69d0aa0f6abd59989c0b71eea46319d9629373f37582041c954ba5670bf3d07d40e95bc04addfe6fb9b7ebfd9b0ac99f4eaf256

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 714cd3ff0c2a5dc06b47af93dc3eae2dd2bb16092ea4733b46f2bea8b844e98c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections