General

  • Target

    7ab0f841170882abb0ddac1c429e59c13e5a73c903408560bd2b2fbca4fe257d

  • Size

    1.3MB

  • MD5

    7dc30255b9c525bfb0e1a1036eb7a9b0

  • SHA1

    3a3f2cba723fee9de8df596791b08a79dccf218d

  • SHA256

    7ab0f841170882abb0ddac1c429e59c13e5a73c903408560bd2b2fbca4fe257d

  • SHA512

    63c71d4a0dd4830bb990362c013b1db2f9ff9dda6a3494a5fd5209c47712b4a580daa27acbe4cd360fdfd921d280369bc57ad040a3b060716164ad1b16755048

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 7ab0f841170882abb0ddac1c429e59c13e5a73c903408560bd2b2fbca4fe257d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections