General

  • Target

    c4d7f6ddaa95b2878d8c8d8dbb3b886c6d338f23808d9e17572cc874a5fe7c52

  • Size

    1.3MB

  • MD5

    eded22238dc5065a0c9385ad5be45043

  • SHA1

    7b591866c664b86b60ceb6d309621fd1efd8228d

  • SHA256

    c4d7f6ddaa95b2878d8c8d8dbb3b886c6d338f23808d9e17572cc874a5fe7c52

  • SHA512

    13c6aa5dcb8a08fa3fe62b4f6a0c6d9cc6e31966098603dbebffaff99c3396230844a8cf499988c92bf758038cf9c0ec179726d99e56224c1a34452e0ffb97b2

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c4d7f6ddaa95b2878d8c8d8dbb3b886c6d338f23808d9e17572cc874a5fe7c52
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections