General

  • Target

    5e1509c2d236df386e6501df91f79a56fd5c089a6a878343ddd003337b3eaba7

  • Size

    1.3MB

  • MD5

    1e88562d39fb85393c2726e2bf9edc3b

  • SHA1

    5cc2488bb85f9798d72a60df76504ee7b306343c

  • SHA256

    5e1509c2d236df386e6501df91f79a56fd5c089a6a878343ddd003337b3eaba7

  • SHA512

    4e7eab579b8a1199e203d1b27e6d4b9a219fe6f314d8ce0b5ee206d6289d6731a704a9b35fea3ce1bfd8d3482102bee0ad78a395afedeaa67190c6d46079fff7

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 5e1509c2d236df386e6501df91f79a56fd5c089a6a878343ddd003337b3eaba7
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections