General

  • Target

    a78e5662d39e1d092b3b33ace561df26f5cfe93824aa2c1285f5933a315d7ecc

  • Size

    1.3MB

  • MD5

    d9d73bf00fc14f9a3994a6b484f6d9af

  • SHA1

    6a8aacd5027bfbb15b942166a7da072b25a87e7c

  • SHA256

    a78e5662d39e1d092b3b33ace561df26f5cfe93824aa2c1285f5933a315d7ecc

  • SHA512

    e43c8447d5f2bc324d58cf0047bfa5d47361399b1cec4dfa01b4aef7a787ddd16c8adc62a5fcbb1926d18b25bf83076ca12b4c0fd72ce925109cfcea971985a2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a78e5662d39e1d092b3b33ace561df26f5cfe93824aa2c1285f5933a315d7ecc
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections