General

  • Target

    24e6196b9fbc61e3b614dd7536230b6c3d280d933a13d845659ae53b0c3abf80

  • Size

    1.3MB

  • MD5

    8f2b7c4a755d7108c25631829462a7cc

  • SHA1

    15ea5dc6fc3fd35ffc8c5ddb52c8ee1173d1d8e3

  • SHA256

    24e6196b9fbc61e3b614dd7536230b6c3d280d933a13d845659ae53b0c3abf80

  • SHA512

    43154ee0039b6ecbbec12d256ebaf246c5c8886aded3eec8aaaec986b98e821ec32c0b2d08d14ba8fe3f642c362be3c0371ecf1099ce8da502d10e71d6bd6475

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 24e6196b9fbc61e3b614dd7536230b6c3d280d933a13d845659ae53b0c3abf80
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections