General

  • Target

    ab40e5ff139752fd9ac2a5120ca0187767e8cd4ffc7f71183cf6cf492757b35c

  • Size

    1.3MB

  • MD5

    edc4527304e9e58cbf29b6f3933ccc4d

  • SHA1

    3ca31926b210f5f592524f40da26663fd7046555

  • SHA256

    ab40e5ff139752fd9ac2a5120ca0187767e8cd4ffc7f71183cf6cf492757b35c

  • SHA512

    83281df86c4d3ccfcb136995c5a3e07a5cfa5bf852c55591696a39cb2e889665ed0112e19851c7fd021e48159bba1d7d2b7aa4a0e0f8fb3f3a5c88f1dc1d7cbf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ab40e5ff139752fd9ac2a5120ca0187767e8cd4ffc7f71183cf6cf492757b35c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections