General

  • Target

    fc40e4c14ebdee48a78386c93f01d2734eaae52ffddf22f6ebfd55eb87f4d890

  • Size

    1.3MB

  • MD5

    60bbd0fc4e56c1c52de9a44295680c6b

  • SHA1

    de7c687fe5641ba7ff812185fbbbf24f176da1dc

  • SHA256

    fc40e4c14ebdee48a78386c93f01d2734eaae52ffddf22f6ebfd55eb87f4d890

  • SHA512

    cc0c78a4f82397b112d45e8d62d0a976331f8ad8b8a2a9bf75f28fb4e4b5c307a2a758e4d0fb029fbf5ca190926844c2c946481d0e888f37bf4e54af095c6921

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • fc40e4c14ebdee48a78386c93f01d2734eaae52ffddf22f6ebfd55eb87f4d890
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections