General

  • Target

    861ea6c0cb0357e1cbf0164c5ff8d71897fd0ff877bc3348b01b7a0d9f44aaf9

  • Size

    1.3MB

  • MD5

    90e1ce516ea2747682c2bdeade29b585

  • SHA1

    2e0325dea1680ef87675196560f072ea47d36e39

  • SHA256

    861ea6c0cb0357e1cbf0164c5ff8d71897fd0ff877bc3348b01b7a0d9f44aaf9

  • SHA512

    bb9502d8fb57903e79aa4fdc0fcbc071a486a495c1b0e56714e20297e72183a480e3a81ea479135f60695e490dfc9de5e5144deab91c0b0384f72be42ae88a07

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 861ea6c0cb0357e1cbf0164c5ff8d71897fd0ff877bc3348b01b7a0d9f44aaf9
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections