General

  • Target

    069b38b09122657f5cf5125f8c409d83f3f149b0c01c6dbf0de787f1f2b47770

  • Size

    1.3MB

  • MD5

    6617f8e6df124b06d6adcb40ea51608f

  • SHA1

    15484eb4b03cd9bc207afe3917865636d0d338d0

  • SHA256

    069b38b09122657f5cf5125f8c409d83f3f149b0c01c6dbf0de787f1f2b47770

  • SHA512

    7b36ce8e4d1b833adab16a3201061276da38d78ac08d69b02aa3f4e2a0c49504582d616b2dc4009df509289f8e062a722329c3be688e47487f0e99c09541c013

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 069b38b09122657f5cf5125f8c409d83f3f149b0c01c6dbf0de787f1f2b47770
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections