General

  • Target

    4bf5e67b8c0bc815d8dbab2d3cf6dfdd118c718a9188b867b75b21c7636f13ba

  • Size

    1.3MB

  • MD5

    69ebc9ce5a00b359242781a507d053f9

  • SHA1

    b0d3a33ed8cef21421a7a48e80245d7c19b8664d

  • SHA256

    4bf5e67b8c0bc815d8dbab2d3cf6dfdd118c718a9188b867b75b21c7636f13ba

  • SHA512

    1ecd77054c3e294ff9c59844210915a0ca5220f55c3cfb4139b9ecced2fddecfe6ced6d1c8ddd5414b5d57074a1df33f19b4cd211391028ce2e0a0f56734c5fe

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4bf5e67b8c0bc815d8dbab2d3cf6dfdd118c718a9188b867b75b21c7636f13ba
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections