General

  • Target

    c5ed1f5d9f2f16e6e72957cb1b00fe4409c57275c8d2d89ca627e03c542632a5

  • Size

    1.3MB

  • MD5

    8cabf3e2578a74d82d269023947b3a87

  • SHA1

    127c280a96fb329e74c4af70ba62a1b182d990d0

  • SHA256

    c5ed1f5d9f2f16e6e72957cb1b00fe4409c57275c8d2d89ca627e03c542632a5

  • SHA512

    539f6fae038cace84ef7f8fec79d0844cc65a0c70b305d7f30f0022c7968011d473a7ee6a9bedea644c9ac7b9398a50ea0af44e0997af5c56d8d0c90d8275e88

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c5ed1f5d9f2f16e6e72957cb1b00fe4409c57275c8d2d89ca627e03c542632a5
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections