General

  • Target

    a4238a86c414387c534c38db9de7bf6a0d036db2a0a27f58cbcc89caec8bd18a

  • Size

    1.3MB

  • MD5

    e7b880eef790f7b68956d9fe5bc0c6f4

  • SHA1

    c06157512e9ee497720b39e85a5eb268e5d42fb4

  • SHA256

    a4238a86c414387c534c38db9de7bf6a0d036db2a0a27f58cbcc89caec8bd18a

  • SHA512

    eea282f824b5dd72a69702b6264160f02ac3fa91c415721af04f9420cae0108aa3026f29b70f32d08f3bfd014d565c6b3ae43fddeae7e5777abc2451ce03d8ad

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a4238a86c414387c534c38db9de7bf6a0d036db2a0a27f58cbcc89caec8bd18a
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections