General

  • Target

    ecf427cfd84ca092683cb313c94943f1830ae6a47083e9c18ed50e416d00b399

  • Size

    1.3MB

  • MD5

    d858e5abae94b4548f23e91439bdeeb3

  • SHA1

    ec1d7e6c409b8dc1e92c671dec4e3a821faeb78f

  • SHA256

    ecf427cfd84ca092683cb313c94943f1830ae6a47083e9c18ed50e416d00b399

  • SHA512

    c648ada37e6ae4b5b3432fdfd0178cfb63a1fcd6a3ace4aa6474c2ce4c461edf481954308c26bd69bde5259418035b1a5f83aa30abd821262a41f50ee6b82d97

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ecf427cfd84ca092683cb313c94943f1830ae6a47083e9c18ed50e416d00b399
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections