General

  • Target

    21b327a0f1aecd5566a19911d11e7b77f8049fe0fb2b74b7aa8fec644e16e6bc

  • Size

    1.3MB

  • MD5

    c7387ba1244feb81eee3c9a7576fb474

  • SHA1

    019f31cbb9ca1907c3e06d250ac3df6856c02d44

  • SHA256

    21b327a0f1aecd5566a19911d11e7b77f8049fe0fb2b74b7aa8fec644e16e6bc

  • SHA512

    af5afadbd3b1efd3aab3aecf904adf8cd84c599614b1aff6589112eefc30ca7ad3d9047f35c60e5be38112a4053be42cb1dd52a35b63e93b4a96a4f82b19ca28

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 21b327a0f1aecd5566a19911d11e7b77f8049fe0fb2b74b7aa8fec644e16e6bc
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections