General

  • Target

    c2a5a0414bb8a98b5cb62e6d3985b6c8da6ddbade8b99e25cea1610a48b5b814

  • Size

    1.3MB

  • MD5

    d08a1d6993e8a066184bc2cc929485b4

  • SHA1

    6fdc775cd10c88bad9cbef9c24783cdad2cf290d

  • SHA256

    c2a5a0414bb8a98b5cb62e6d3985b6c8da6ddbade8b99e25cea1610a48b5b814

  • SHA512

    d83eb90a6f51501da3161110d38e18e5a6edf50fb200e4b570ccc6a8d81d1a03f777310792721279cc0a5c0af8c41e54a0ff67c4deef1c4bd47745df1c980f2f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c2a5a0414bb8a98b5cb62e6d3985b6c8da6ddbade8b99e25cea1610a48b5b814
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections