General

  • Target

    d32a974dfaa6d6c66668ad4f1a11231dd6234e7e0145b030414d89c196e9dd45

  • Size

    1.3MB

  • MD5

    511b1c77897d8de9fad1996775f0c1db

  • SHA1

    56c0d45b9d685d2a49f05c2e0e5a86591170388e

  • SHA256

    d32a974dfaa6d6c66668ad4f1a11231dd6234e7e0145b030414d89c196e9dd45

  • SHA512

    d2455c5e951df8f4786f362057765004960e30b7ec7b855e95b7dd77a38b2595d2abb419e9a7f7f84ef2c5d7b75a332c8fb22fb52198596c2f4fb85f4e373546

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • d32a974dfaa6d6c66668ad4f1a11231dd6234e7e0145b030414d89c196e9dd45
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections