General

  • Target

    4e819f16a0d0e742d3e7eeb2dfddc1c6e977e4c4eeda39cd942ee75bec1dfbad

  • Size

    1.3MB

  • MD5

    6f1ab8b4d145651a739a1a842f85af67

  • SHA1

    1b0d3f5112c3afc8aacbbf6abcd004c6e02db7f1

  • SHA256

    4e819f16a0d0e742d3e7eeb2dfddc1c6e977e4c4eeda39cd942ee75bec1dfbad

  • SHA512

    a123e06df7641f583fa2163f7b0c3d21a324c1bc31433ecad561ce76c21da1fc6a3806786bab65dd6da903470dc742f708c1c95d1fbfc0645e182674269916a6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4e819f16a0d0e742d3e7eeb2dfddc1c6e977e4c4eeda39cd942ee75bec1dfbad
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections