General

  • Target

    f0164293f14ef0efc69dc33393aab6140ef2a533d0ba663c38e3840e4ee5e907

  • Size

    1.3MB

  • MD5

    4d0ea933aa3e322accaf21bdf46a0297

  • SHA1

    068ba7ff6c1151f1e786efc564ef2c37c1be187c

  • SHA256

    f0164293f14ef0efc69dc33393aab6140ef2a533d0ba663c38e3840e4ee5e907

  • SHA512

    3ac701632f95e9cb0f24b87d7df7b4058aed949204fe4c3a0161a706c40a5ba342d840a6a4ea1301cc9c247324c282c0bceff283a585b52f08e69c181daaee7b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • f0164293f14ef0efc69dc33393aab6140ef2a533d0ba663c38e3840e4ee5e907
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections