General

  • Target

    3b7e4dbd6682156fd7be8bc4ab601e4a0d1391e71a1886871a6871f4101ba9c7

  • Size

    1.3MB

  • MD5

    b88b0d105627071613e627c3ef7fd4ce

  • SHA1

    4cbdf04ab2fd484d670996c8e7bd292b189bfa20

  • SHA256

    3b7e4dbd6682156fd7be8bc4ab601e4a0d1391e71a1886871a6871f4101ba9c7

  • SHA512

    638b7f27114b2f155e5bf1a90e6b3564c446f59f842e89eabf545b75275698bb8f8f54aea63814eefc4382383a333b44e3837737d780f6893c7a6b93f5d3d818

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 3b7e4dbd6682156fd7be8bc4ab601e4a0d1391e71a1886871a6871f4101ba9c7
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections