General

  • Target

    40dcf72a26b31dfe77e662b685bae1f7895260c314df505c56ea442c48db6a55

  • Size

    1.3MB

  • MD5

    dec75a68fd9ba691f62e67c8cabaa9dc

  • SHA1

    c3eb79c5e44fbc6da364747aff02546a0053ce7a

  • SHA256

    40dcf72a26b31dfe77e662b685bae1f7895260c314df505c56ea442c48db6a55

  • SHA512

    7c5e6f83b5c5a4fce009105fe6f853c7e4a133415ccd4ddd372c8d1831fe7e8474fae491c08668983baafd782bd0b7c2a774f567e20a3c21a5923ac0d60536d6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 40dcf72a26b31dfe77e662b685bae1f7895260c314df505c56ea442c48db6a55
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections