General

  • Target

    0bbb533c6214c9c91f60ab7ba792475b02beb4534d0ef8ba2f3b3a429bea39c5

  • Size

    1.3MB

  • MD5

    75ae35903f659be3b5ddd8c7b709fa17

  • SHA1

    7245a1f6b47587e7f8609c12d42b4c6feb42e2a6

  • SHA256

    0bbb533c6214c9c91f60ab7ba792475b02beb4534d0ef8ba2f3b3a429bea39c5

  • SHA512

    5f8f248ed09d7125e87e3e533ac33f423df3108a4d154089283e459c454565ac6fa02cad787fa0ee5a2cb6c8193cfbdffdc7f24dd7a94b8332956e9a96284df6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 0bbb533c6214c9c91f60ab7ba792475b02beb4534d0ef8ba2f3b3a429bea39c5
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections