General

  • Target

    c0f9cd43b0ec1e22928c01c22ee189e1fc12ab7be3eb04315bdd2b226f7c8bbe

  • Size

    1.3MB

  • MD5

    c7326a60bb64cf868e243869c6309f08

  • SHA1

    76d5388e6cc4b562b1b71bcc66e499ef38a7f98e

  • SHA256

    c0f9cd43b0ec1e22928c01c22ee189e1fc12ab7be3eb04315bdd2b226f7c8bbe

  • SHA512

    413c081da6db8a8074c68257c48e2ad579c38635bebb1cf138c4667b8bd3e08f92997146f4ff7a06cf428af863ccfc8f6a5511cefc7c1009492763a3d346f351

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c0f9cd43b0ec1e22928c01c22ee189e1fc12ab7be3eb04315bdd2b226f7c8bbe
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections