General

  • Target

    6278c3294f9ac8e401b4a7ca0d44ad53728c61fa17df290f3311ebcbb57f3e11

  • Size

    1.3MB

  • MD5

    f4006cdaf545b92207471a89a8b4679a

  • SHA1

    3bf415febf8ec811178406d36776ed5f253fbd6e

  • SHA256

    6278c3294f9ac8e401b4a7ca0d44ad53728c61fa17df290f3311ebcbb57f3e11

  • SHA512

    b39de69e197c55639cd5551593b89407d05c5955f48ab42958b0970f320dd61de6efe4b0ae8a694a73838707cdcc25899edddb432d0df788dbca8b812bb6b363

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 6278c3294f9ac8e401b4a7ca0d44ad53728c61fa17df290f3311ebcbb57f3e11
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections