General

  • Target

    db10b6ec4bddf6925cd5ffd857d2e8019ef5c26044199749a714f3833cfc899d

  • Size

    1.3MB

  • MD5

    987a93f8d830e1007ad7b0fc9699740f

  • SHA1

    fe41c3c1398dc0e8890d86776e28576b00bcff42

  • SHA256

    db10b6ec4bddf6925cd5ffd857d2e8019ef5c26044199749a714f3833cfc899d

  • SHA512

    2f83a045d4d1362731eee6a7e6770aa2c9ffa9a4209c6381ec959fdef22577209d75cc8638fd3fc9f1dd2715cf2550ec34f30b479eca34ca152d928df92e6b52

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • db10b6ec4bddf6925cd5ffd857d2e8019ef5c26044199749a714f3833cfc899d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections