General

  • Target

    a4e49f8cf8be0f7135ea17f5748e55f3c8bc453133b92a2f137d973d5cb9c4ee

  • Size

    1.3MB

  • MD5

    f42f232e9b2f84bf157793fa9bfb0752

  • SHA1

    a0f58c0498f574b418565697afce275ae681ca36

  • SHA256

    a4e49f8cf8be0f7135ea17f5748e55f3c8bc453133b92a2f137d973d5cb9c4ee

  • SHA512

    afaa100fed8200b6e56476bdedc937d171a287e9e93de95395d1f55521dca2235df8bffec67af599f031a17a65f53904616536a07006896233ffbafd8c33f7f6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a4e49f8cf8be0f7135ea17f5748e55f3c8bc453133b92a2f137d973d5cb9c4ee
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections