General

  • Target

    16908797223509282fa8aae7d52c2c44f1ffd05397d3f5b33c62804b0e873397

  • Size

    1.3MB

  • MD5

    5ff439e233b6ab3654b0add58ec2654c

  • SHA1

    a5993a3c627eb232643e6d29c4d4c35f7d15d325

  • SHA256

    16908797223509282fa8aae7d52c2c44f1ffd05397d3f5b33c62804b0e873397

  • SHA512

    c904a733c4b91962099e7b738a9c909b2e4112af0d438ec1b8a907f49bfdf0db67817d6c5142ab91d77645b63f299f9bc634d343a735f8f3381e91735dc9f5c2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 16908797223509282fa8aae7d52c2c44f1ffd05397d3f5b33c62804b0e873397
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections