General

  • Target

    b6a0977d875a2601bb8597c0e04d60df76d4ef3d06a6653106342c727d862ebd

  • Size

    1.3MB

  • MD5

    d85cd90e9c6df7c9b8b4d394e9e1ad42

  • SHA1

    bb20fbb3e488018573500291886705f93d3c3893

  • SHA256

    b6a0977d875a2601bb8597c0e04d60df76d4ef3d06a6653106342c727d862ebd

  • SHA512

    06d2a4dbd3696b72542c90cf3b7f6b2101c73a6671feae8ff07b3c096c08688e6e4f277a8cb5ad78f7535ce54a495ec482472bf1c2a3aa37d2db62c4a7c1ce0b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b6a0977d875a2601bb8597c0e04d60df76d4ef3d06a6653106342c727d862ebd
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections