General

  • Target

    583aa0e582ed82eb4a51a653ac022c2a5cf34af0cbf50dd9c9d48ee74fbdf17f

  • Size

    1.3MB

  • MD5

    551cfa4d6d3eca2368ef1b322a061de9

  • SHA1

    f87ec1fb32f1304daa31f1ec87edfcf5df6ed063

  • SHA256

    583aa0e582ed82eb4a51a653ac022c2a5cf34af0cbf50dd9c9d48ee74fbdf17f

  • SHA512

    f580b9984b0421d8cd104f1f6969361cc227e74f9765c99a8dd6a09559d43a1ef132973db877d0680d9e6c9adf434f0bf9752b1db29a6733cee184ae14115e46

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 583aa0e582ed82eb4a51a653ac022c2a5cf34af0cbf50dd9c9d48ee74fbdf17f
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections