General

  • Target

    ef04e639f3be87a95e31fad75b1c1125c4eae666cff1cae21b3f68e12ebfa4b0

  • Size

    1.3MB

  • MD5

    356af3cc852ed6aba6b37cf607153ddf

  • SHA1

    c5f1cb3b173fa21984fa41e99a5a3dbd30097287

  • SHA256

    ef04e639f3be87a95e31fad75b1c1125c4eae666cff1cae21b3f68e12ebfa4b0

  • SHA512

    2135f1ffd2fcc9932000edcaeaae68958f6fceeba92dcb25faaee0980fd69ef0f4b3d6e78fd81b3e8d39af107a33a50a49f7148b9f3e0157a59bc3fde2e62fd7

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ef04e639f3be87a95e31fad75b1c1125c4eae666cff1cae21b3f68e12ebfa4b0
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections