General

  • Target

    b3e5d64845b701e0764dc8e29535c3a36262b2dc172dc0fb66c0e163c04b6d74

  • Size

    1.3MB

  • MD5

    945fa0f173dbbc470da045c099043150

  • SHA1

    e310921a31e9fccd74608c9ad315807ac1181cd7

  • SHA256

    b3e5d64845b701e0764dc8e29535c3a36262b2dc172dc0fb66c0e163c04b6d74

  • SHA512

    e14cb9825b4c7338d492c42c7416350f47f53cfcf4aa38f853d4d1d339bea615a62198eea870c73d39a0142f0d0077dd09feea2b8b2d8dc7c8dfe3c14f23210b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b3e5d64845b701e0764dc8e29535c3a36262b2dc172dc0fb66c0e163c04b6d74
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections