General

  • Target

    c196a7b3079b9d15a5068884abc72fc16bac3b29dfe0418813f62f5fbe77ee72

  • Size

    1.3MB

  • MD5

    08cf8298e6b9abb08fea74d26a81e2a8

  • SHA1

    6a5f737545aa34085df8ecfd5ab5d8c57f5199f4

  • SHA256

    c196a7b3079b9d15a5068884abc72fc16bac3b29dfe0418813f62f5fbe77ee72

  • SHA512

    b9ca21c3b90df58f57d213537e3c850a63674265e788f82b61254d8a3e9850d81a5d8769d0ecfe093c28cc31a2d5eb8b52bcc8e620fb5481af8ebf19c8c080ae

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c196a7b3079b9d15a5068884abc72fc16bac3b29dfe0418813f62f5fbe77ee72
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections