General

  • Target

    e1b4096c52c0c25da85937050803d6ac38fe7e7b23baae78482d0a22c9fef1a9

  • Size

    1.3MB

  • MD5

    3d6f824ec20ac13fc152a89e60460117

  • SHA1

    ab51b93ac8aed1f73da221c09475b1dc1c836ead

  • SHA256

    e1b4096c52c0c25da85937050803d6ac38fe7e7b23baae78482d0a22c9fef1a9

  • SHA512

    41b2bb148af25a0ef3a2b155d308d875c8b320d34e0aba40ad261476bfda9ea0af01428b6a94c423c4832c3ea9308ed8692e7981bea6cbb892eaac5ce66901e7

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e1b4096c52c0c25da85937050803d6ac38fe7e7b23baae78482d0a22c9fef1a9
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections