General

  • Target

    ce65a1a7cbb1da995e52d5bab68da9a0da90d13b784306b442f9190e6c595b06

  • Size

    1.3MB

  • MD5

    5320d65d901d7a17f8f0ae30a6300f0e

  • SHA1

    9a5f9d3549afe885df099b2f540f2288d8dc8c97

  • SHA256

    ce65a1a7cbb1da995e52d5bab68da9a0da90d13b784306b442f9190e6c595b06

  • SHA512

    fa613010ec0d4a2285d7bb49a4c56e1c1f51dd75731cd70b640eb12f2ece0e7f15060d3417e1ae526ff7a259f0f5502f36c17f02887098343ea01981d5152cca

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ce65a1a7cbb1da995e52d5bab68da9a0da90d13b784306b442f9190e6c595b06
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections