General

  • Target

    2b09adbe71c3c9a0fe86ab89fcc3f4b4510a49b407d42445ef04388d1b03c953

  • Size

    1.3MB

  • MD5

    17008e4ff72b620579cd94c544f610f9

  • SHA1

    79d0b66aedb64d0b99168aafad9cd0c1b28654a1

  • SHA256

    2b09adbe71c3c9a0fe86ab89fcc3f4b4510a49b407d42445ef04388d1b03c953

  • SHA512

    aa2a298525a21331795c41fbe28c4d35fef3beb0be319da5b81060b8b68b2d86e77aeae3099c513922cbc38d0c23dd41a36077962756e3e523022552afd3ce9e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 2b09adbe71c3c9a0fe86ab89fcc3f4b4510a49b407d42445ef04388d1b03c953
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections