General

  • Target

    596e3ed5a3937aa60d640c920a09e44965a1e55943fe41356f49a63a88c3d056

  • Size

    1.3MB

  • MD5

    39f167f1a6df919d9f1dbf409c2a3d28

  • SHA1

    e61e31b3718bae4ec570acc2fe522e1141fabf33

  • SHA256

    596e3ed5a3937aa60d640c920a09e44965a1e55943fe41356f49a63a88c3d056

  • SHA512

    73c2fa8e177a3a4786d68394a09d92e06737a4d60c0ad48cfd7bee209b330804bf9965c47b7c8be2e4b29e9f67a3369f5dd1887234c27c8f431f3596a0bad88a

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 596e3ed5a3937aa60d640c920a09e44965a1e55943fe41356f49a63a88c3d056
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections