General

  • Target

    c03eaad4b4aa254a7b6173a5c7426c00387ebd39824a0c642c6916ee9cdf26be

  • Size

    1.3MB

  • MD5

    6aff2e6b7aecbda4969e554d0dc7d2b8

  • SHA1

    c72cfc7ca99db7bbe97aec77ca3cc64ecd6c904a

  • SHA256

    c03eaad4b4aa254a7b6173a5c7426c00387ebd39824a0c642c6916ee9cdf26be

  • SHA512

    4d6a547b835270ef6f72ffba30a8009ab5a62f8a8be6f3c4cbc190021b3d3ee891c93c5511fe3d452a95e2a1d83272c3a4a6609e5cde628ad3bd4434e26fcf4d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c03eaad4b4aa254a7b6173a5c7426c00387ebd39824a0c642c6916ee9cdf26be
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections