General

  • Target

    d5db39bc3e7378de31a7b2d60b1660e743f3c01540c79c2c13128cb34200f169

  • Size

    1.3MB

  • MD5

    f3c9c8fcdc97ee343cd1c164b4b4c8ff

  • SHA1

    4ee049708648e7307f0fead0d284f323048b8201

  • SHA256

    d5db39bc3e7378de31a7b2d60b1660e743f3c01540c79c2c13128cb34200f169

  • SHA512

    ca3959e832d5416bdd891fbb85a5ea0d3103cea8399e14fc16ba3b709b72f5d90d91fbe7d1176b0bc1f8d77675513ade69fe15cb2b146957378755f7e0cfb6fc

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • d5db39bc3e7378de31a7b2d60b1660e743f3c01540c79c2c13128cb34200f169
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections