General

  • Target

    e6f6adf033f62c0f8fd2fb59292243496307552e67cb055285c618aa3b3ad0fb

  • Size

    1.3MB

  • MD5

    1c674851c2eb5e01e18de33cbe829cb4

  • SHA1

    177966c82a9323f8702b29a041ffeda134f1989f

  • SHA256

    e6f6adf033f62c0f8fd2fb59292243496307552e67cb055285c618aa3b3ad0fb

  • SHA512

    d6c0a3b03cdc4c09744c858db9dd3e9558b480e7e81e842f66db828046d8826a0bd1b1ba91587cfa9020a897d0299ffc1b64addfe25cfcfc1c3044854b0e5500

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e6f6adf033f62c0f8fd2fb59292243496307552e67cb055285c618aa3b3ad0fb
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections