General

  • Target

    959e8a022a4dc38a501a250d40725bd64a581d43a150894deb14e07cc38e97c8

  • Size

    1.3MB

  • MD5

    d62e8dfe2c2c421e854fc9fc6ef451c4

  • SHA1

    72acac41d03dd8d740ef8d0d241abc6d075422c2

  • SHA256

    959e8a022a4dc38a501a250d40725bd64a581d43a150894deb14e07cc38e97c8

  • SHA512

    e8c7caa773fecc51a1f7219dbd71d562c5e45a7068171fb57e55ef7fa449c3e21d7fb2c50eb19288ebc5ceca6c0ff82ec3a16f65219e3f33f8720a168487c093

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 959e8a022a4dc38a501a250d40725bd64a581d43a150894deb14e07cc38e97c8
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections