General

  • Target

    a1e35be4ab3c099ff306e88d8878fab591538afbcbd0d86856cd8f801710f8bf

  • Size

    1.3MB

  • MD5

    b77b39ae309e7b1af53ef37fb2e9502d

  • SHA1

    832baa6f0c7c2e9c36ec58fa22e9c35f698b9016

  • SHA256

    a1e35be4ab3c099ff306e88d8878fab591538afbcbd0d86856cd8f801710f8bf

  • SHA512

    2f62a1e384fa4702bfdc525fe1999d359d996829e2afebc9cdab5f616c5a8680d5696e3d148d88684a953d3c22f0ff86bd3f7edf7a26696fd63f5c336598abfe

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a1e35be4ab3c099ff306e88d8878fab591538afbcbd0d86856cd8f801710f8bf
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections