General

  • Target

    ba72fe3bc4d6850caa340f11db6a09b180f1d5fae5e9b905ccba55d39d1dbf81

  • Size

    1.3MB

  • MD5

    38d0cf9758cf35c4302ebb3229cb785d

  • SHA1

    3c34456a3f6c4fe9de14d6bd3a6c0f34f53db670

  • SHA256

    ba72fe3bc4d6850caa340f11db6a09b180f1d5fae5e9b905ccba55d39d1dbf81

  • SHA512

    cb1f6adc4b36f2eb46f47ad6d89863d903dde3f20476135df9bd83969ee644c2b76627c56a2b5bab0ce523be37f2c0d3a3e72c3d17e6fdb650496bdaed7c28b3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ba72fe3bc4d6850caa340f11db6a09b180f1d5fae5e9b905ccba55d39d1dbf81
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections