General

  • Target

    c4e9853e5faf46937bc9dde2370d892b35bc6938f07a24fdceaa0b97c6bd943d

  • Size

    1.3MB

  • MD5

    72d4cf356eb03f0b7d5e25a93d0b3f98

  • SHA1

    de3c4938273fbcd229ddcfb864bd9d27367cc5df

  • SHA256

    c4e9853e5faf46937bc9dde2370d892b35bc6938f07a24fdceaa0b97c6bd943d

  • SHA512

    df5eef9f4b74e0384436bd02ae35ddd5611c8ad708e14a74bcd8e7d76f440f2cf065ff5d8a8b2cb675f4d840c70122c7d6acb66ea8181f51b0d0dcce399b3d6c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c4e9853e5faf46937bc9dde2370d892b35bc6938f07a24fdceaa0b97c6bd943d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections