General

  • Target

    f3065a9b867b6c5dbc0fc85e35b6778c6f54b829184d0b0598a5eb94f7ba7bfb

  • Size

    1.3MB

  • MD5

    69728146ed90a1ecf62024ada0fa3e1a

  • SHA1

    07d4dcf4ee5fef354317af355138066589ae4b8d

  • SHA256

    f3065a9b867b6c5dbc0fc85e35b6778c6f54b829184d0b0598a5eb94f7ba7bfb

  • SHA512

    e920037ac7e68a3d7b989a24c095b9484d35be01c76d8097f1462bc78262f5122216022850a4f478f4c99ae2b806cafbadee0710b7dd66e3be27a2b22f549a01

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • f3065a9b867b6c5dbc0fc85e35b6778c6f54b829184d0b0598a5eb94f7ba7bfb
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections