General

  • Target

    1645c2114e4798e9bfd5be9cde1b957f5a4f4417ab6779795ed33b2b38e16e45

  • Size

    1.3MB

  • MD5

    4e88b42d163868ad7248f9c5685e27a6

  • SHA1

    2889c767dfc72802cd6b545b7efcd8cdb38da8e7

  • SHA256

    1645c2114e4798e9bfd5be9cde1b957f5a4f4417ab6779795ed33b2b38e16e45

  • SHA512

    b49c0b51e6e4047d5a2eb7ca9823bc3980b2e22ef2442f3bdbc92df3a5eaba4b0466a3c6f93961d9b1699e05063d921b18bf77ecccda1afbdd02c6e0a20453e4

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 1645c2114e4798e9bfd5be9cde1b957f5a4f4417ab6779795ed33b2b38e16e45
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections