General

  • Target

    ae397e0dac6b252b289d27da2d5bcd71db7284f6a648e5b09dcb2dbf435be406

  • Size

    1.3MB

  • MD5

    8e4cc2ec1b87cff16f81262180e09fdb

  • SHA1

    e95dee2c3bc24e5e5cf7c177920ffb70508b958f

  • SHA256

    ae397e0dac6b252b289d27da2d5bcd71db7284f6a648e5b09dcb2dbf435be406

  • SHA512

    5a2295b66666c527b92457ec4355341c8a701fa7bd121927be4b0aa6db9f40a7a1fd7322128906e52e98cafd72c84e1aa1a2e1cc14807d3cc9fe9dfc5f97e906

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ae397e0dac6b252b289d27da2d5bcd71db7284f6a648e5b09dcb2dbf435be406
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections