General

  • Target

    52f06b00f3e0e9bf07268adaf8aac5e0f44a18f64adfe4b80bd0fa4452c7f6d4

  • Size

    1.3MB

  • MD5

    646dec2b3fdd85bf4c22d914ee4b74ed

  • SHA1

    80cbb52b681dc077cb5ca1f054080b61d9dfac22

  • SHA256

    52f06b00f3e0e9bf07268adaf8aac5e0f44a18f64adfe4b80bd0fa4452c7f6d4

  • SHA512

    dfbb4aadafec8e1c6486726081d1f7bdb66641685be4faac84c663cf6788cd8cc43a2f4503d60ea1cc7ea3007270b3ce246131ab50fb93ce33613fce6bd303d0

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 52f06b00f3e0e9bf07268adaf8aac5e0f44a18f64adfe4b80bd0fa4452c7f6d4
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections