General

  • Target

    d85c17665062f20ddba0a4c96aa3b7b1d62bec362af7e9772dc64074eff2bf32

  • Size

    1.3MB

  • MD5

    043aedb82d97ad8ac9fccf00b9e1d086

  • SHA1

    ec62bfcc1efc6c7532f527830c8ef0963591b2c2

  • SHA256

    d85c17665062f20ddba0a4c96aa3b7b1d62bec362af7e9772dc64074eff2bf32

  • SHA512

    c3c69acb98296f2e89fce412b1d9e44438a68a75953769b0707c7f4922ee154287793fd9f0b0f0bb38b710f0ff55bae9ba72e5eb9f17e5b4a3dc08cbc451daff

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • d85c17665062f20ddba0a4c96aa3b7b1d62bec362af7e9772dc64074eff2bf32
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections