General

  • Target

    84e1ca8d7ac6fd014c7aed76f843f237a8c655706b4f6c59e31cb7ac3790ead7

  • Size

    1.3MB

  • MD5

    9716e13b78420d59cc8a6a8318bde8ef

  • SHA1

    8c6c5a32ce7ed6845f84d3231ea5ae5cca4a8beb

  • SHA256

    84e1ca8d7ac6fd014c7aed76f843f237a8c655706b4f6c59e31cb7ac3790ead7

  • SHA512

    d13c9af0ef285becd9e7dc3fd4cfe25b49ab7c11a86d8d2780c490c6d4705344187fd1ed4b5fcd827db5c74f206e1496e2a06ac949037bf9e9b9f0c56985647f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 84e1ca8d7ac6fd014c7aed76f843f237a8c655706b4f6c59e31cb7ac3790ead7
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections