General

  • Target

    3c793b022e3b8b192af268e0b7527a20477d5f14ce706cbd2e327f6171abe280

  • Size

    1.3MB

  • MD5

    83e6455917e40c0c487dbdc5503618ea

  • SHA1

    6f218d436e8b2d9f9b9e1eb53adf186638283dd2

  • SHA256

    3c793b022e3b8b192af268e0b7527a20477d5f14ce706cbd2e327f6171abe280

  • SHA512

    5cc576b0816ee04f33b8284aed78348ec96a7d3a5c38da4bec747cb8c5a6d4ed68e14e4920d6bc6dc6f683dd97c8dd742fb96443e30e84c8446699458c5ddac8

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 3c793b022e3b8b192af268e0b7527a20477d5f14ce706cbd2e327f6171abe280
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections