General

  • Target

    d06e0aa44cfe4e2abead7e3bfbc2be3bc5066ed0812d10d88cde6a3ad3d6cc13

  • Size

    1.3MB

  • MD5

    b771405b25bc7fbf9c4f2e7fa1261c35

  • SHA1

    9662638aa1f803ecb14459e4f258198aae40a538

  • SHA256

    d06e0aa44cfe4e2abead7e3bfbc2be3bc5066ed0812d10d88cde6a3ad3d6cc13

  • SHA512

    be7060bce225775b08aa864de0aa7edefc0dc177e2f14f75bc8d5867859af118702e3d2e07b2f0a539e1f9690018436637a33b3e0fbb5f0c19439576fb92e86b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • d06e0aa44cfe4e2abead7e3bfbc2be3bc5066ed0812d10d88cde6a3ad3d6cc13
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections