General

  • Target

    eb89465b81ceb2872cb38765a5b5f59944395cb92783f0d5080d850900a24a9c

  • Size

    1.3MB

  • MD5

    4a0d29f866d171089d2b372d84854dd2

  • SHA1

    d9b60f930a3b258e15e0def3e9b6ae2b49fe64e6

  • SHA256

    eb89465b81ceb2872cb38765a5b5f59944395cb92783f0d5080d850900a24a9c

  • SHA512

    30f46a5e4b807006f239fcb3e86ce71c024be34f2adab6dc8bfd3ed3d3f97f0491967c8ea6e34a0338ad57ca42562ffb53f9ecae3913a4a2653d13c624d99f55

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • eb89465b81ceb2872cb38765a5b5f59944395cb92783f0d5080d850900a24a9c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections