General

  • Target

    5037b1a176e77774bf0e4eb4981f379c7b34f1e41b0e0076ec250a5a1eea0209

  • Size

    1.3MB

  • MD5

    c630e0a5c6dd8c3d03a5f6cc2400ac25

  • SHA1

    a988dfb4004450e46af722c2b7b9502ec1db429e

  • SHA256

    5037b1a176e77774bf0e4eb4981f379c7b34f1e41b0e0076ec250a5a1eea0209

  • SHA512

    3b0e91bc95560bf4be7e61237633b0d7ac0f07ac91a159d570c2b30bf6db9affa0fec9df11f4741d83c4ee262bd1f4a39ed0779f602b6a092a1982541f64468b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 5037b1a176e77774bf0e4eb4981f379c7b34f1e41b0e0076ec250a5a1eea0209
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections