General

  • Target

    c488d2e7dfb803d91965d9e09e77dadd03febb8f4e17c1d429f4482ed17b53e1

  • Size

    1.3MB

  • MD5

    cf54a91390160a48fe17a5bc232a7069

  • SHA1

    06adbd8b975eeae54240df5a085dc212071c5a19

  • SHA256

    c488d2e7dfb803d91965d9e09e77dadd03febb8f4e17c1d429f4482ed17b53e1

  • SHA512

    8da79a0506e99e7d39ebb5c7fc101d175252e2268a1be7638c2d63a1df50ff4659fc747602f8c558f27010909c315e6d3ea1164f6b603a81b76c17bfa0381681

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c488d2e7dfb803d91965d9e09e77dadd03febb8f4e17c1d429f4482ed17b53e1
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections