General

  • Target

    067c14c6bb4fe75c6af9f37ec2dc238dc7cf5428f74369d36af5f1616d8c4192

  • Size

    1.3MB

  • MD5

    6cdb83b5d8cc5d08ab8116f854886e09

  • SHA1

    b504691604ed9e8484e53e10aa9754415fa9e706

  • SHA256

    067c14c6bb4fe75c6af9f37ec2dc238dc7cf5428f74369d36af5f1616d8c4192

  • SHA512

    e8f787d1ed7c1d5f91ef082997fe3a8d2f376d96c9d84b7b9b1fc1abd824a90ded298e591a797c25df9aca48e4455e7bb001399de7b90c44e4eef0555cb4d729

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 067c14c6bb4fe75c6af9f37ec2dc238dc7cf5428f74369d36af5f1616d8c4192
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections