General

  • Target

    89b0c8dbc4f07307435636356a7dd7fdd948654a2f951e92e1f5bd3fdb8b14d4

  • Size

    1.3MB

  • MD5

    aacc3fb2916301501080c693e271ec83

  • SHA1

    4fee8095e66657a2f28cd99f7f3c1e5a89c92b80

  • SHA256

    89b0c8dbc4f07307435636356a7dd7fdd948654a2f951e92e1f5bd3fdb8b14d4

  • SHA512

    7b08f57c453643a63cec4d57fc8c9256a8072a82aad9a72714eb78fbdc4584648e2e5044d923f4d65014833e913ad6a6544db5b7b80ef43506b595f595fae928

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 89b0c8dbc4f07307435636356a7dd7fdd948654a2f951e92e1f5bd3fdb8b14d4
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections