General

  • Target

    8e05f4b425157aaa9cfeb226e267ec88f07c3752a15812e1b2a549e1aa78e4c7

  • Size

    1.3MB

  • MD5

    20c776b6493ddab1ba210e97d85f8cd4

  • SHA1

    c672b9e6566978b4ede50d0f9f5cfc6cb1359f17

  • SHA256

    8e05f4b425157aaa9cfeb226e267ec88f07c3752a15812e1b2a549e1aa78e4c7

  • SHA512

    a1d296830b3d3e20b33c4bc1935d510d091b040507412f2012c8ce55e09d3fe2313d7fba368919427d308cd1b46b1b2fa8dfc2ae3c92e2ca99b6fec721dc9fcc

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 8e05f4b425157aaa9cfeb226e267ec88f07c3752a15812e1b2a549e1aa78e4c7
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections