General

  • Target

    61694f4993ea8f569f13140be7f84c6a031a3e1d302de9cb4808abf93ec4122d

  • Size

    1.3MB

  • MD5

    ddd70eb6598be884de50eed5f093e124

  • SHA1

    cf02730c82c517e0e171ed2b8b57d66c644b33a4

  • SHA256

    61694f4993ea8f569f13140be7f84c6a031a3e1d302de9cb4808abf93ec4122d

  • SHA512

    b4b21523af81444762ad5274a2aae3229cd0de65fb4ff7535a5a46677cb3ab3adc6293bdd27ea87b606ee67cae2475f862b7e48acc732c0c6970d7d86fd67f22

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 61694f4993ea8f569f13140be7f84c6a031a3e1d302de9cb4808abf93ec4122d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections