General

  • Target

    d0b6fe951403221915f06c6f67d769e7b28efe379c032a91b5ad216d9e4afaa5

  • Size

    1.3MB

  • MD5

    e640d9b211e13bc9a05ba84703ca9191

  • SHA1

    8f16b02428134723f53414eafda4d847e113e9b8

  • SHA256

    d0b6fe951403221915f06c6f67d769e7b28efe379c032a91b5ad216d9e4afaa5

  • SHA512

    33411b0f683a168a4052e2e1a5d18f78f7d74090c8b85a9c74df02bbb59259767079a1fbc5079ef427de3e0c5ee8520ce2ff9256e3a14838c32f6e1f9a33718d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • d0b6fe951403221915f06c6f67d769e7b28efe379c032a91b5ad216d9e4afaa5
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections