General

  • Target

    5e3c0b4974f09a14ead9d695e0ed470610f3c6dd0ccfdc34f8fb4fbb36ec180f

  • Size

    1.3MB

  • MD5

    29397af95c278b972cfce96b85cb2805

  • SHA1

    96d6a5d0fffdbc52c1a9a188681436f24ce6125b

  • SHA256

    5e3c0b4974f09a14ead9d695e0ed470610f3c6dd0ccfdc34f8fb4fbb36ec180f

  • SHA512

    daa67a7631a10c6ffabb575d85999c473c0bbc64a266d3f5cc5120b66cba185a603036d5d92297a4f4a410c2df62eb027998b97cc92c9627c850af6a4c460833

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 5e3c0b4974f09a14ead9d695e0ed470610f3c6dd0ccfdc34f8fb4fbb36ec180f
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections