General

  • Target

    587eb830e49caf0b79ae6676f9e4aa834b9d1c680e2fab3bf0201f3f7b64813a

  • Size

    1.3MB

  • MD5

    4d42f1a06657994375c40da2091e53e9

  • SHA1

    3f5140efc0f0b500482b1c082cb452f57105747e

  • SHA256

    587eb830e49caf0b79ae6676f9e4aa834b9d1c680e2fab3bf0201f3f7b64813a

  • SHA512

    be61e7210c86bda0b84defaf7c5da61597b425e8d2db825c73622149019f4da15e93cef6a57d602743f00820f076943bdc9426dd391b13307108e1247f58a400

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 587eb830e49caf0b79ae6676f9e4aa834b9d1c680e2fab3bf0201f3f7b64813a
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections