General

  • Target

    300a9e6774f1a61b2e54d18b31908e9858159d177e625970fce1594eb9dd7414

  • Size

    1.3MB

  • MD5

    77ce045477b2d750032a85111c3176fb

  • SHA1

    e150bacd30c2064fd0823937c35d898e36d8b3ff

  • SHA256

    300a9e6774f1a61b2e54d18b31908e9858159d177e625970fce1594eb9dd7414

  • SHA512

    84bf9252d9c49c2575b70cd7c67594ea4733fd65295cce3d088045007f8f2cfabca4ad1336ded200afc4c7b793391b34b6c2a83c4166f61598323adc88f0fc42

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 300a9e6774f1a61b2e54d18b31908e9858159d177e625970fce1594eb9dd7414
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections