General

  • Target

    e14e6d4592a0989a8c81c2226bf169c640342e718bbd92978de4f2c9e0cd7436

  • Size

    1.3MB

  • MD5

    b4d2afb6b6ae1093cd85a23e2811e6ab

  • SHA1

    ba361f3cfd2d2b8fa1680c3f411e503f315ae8d6

  • SHA256

    e14e6d4592a0989a8c81c2226bf169c640342e718bbd92978de4f2c9e0cd7436

  • SHA512

    82358235b2116ae525f7acfa8ec506a63e2ef1e5fb697514430f072265b2d5814d68ededf9e89140e321296b22385830f87c071bd8e55f0b861277bddce74c36

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e14e6d4592a0989a8c81c2226bf169c640342e718bbd92978de4f2c9e0cd7436
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections