General

  • Target

    c4fb3e0ef0d0e323eca386f58696f701b0fa7644c1d0cbb680d3f218c2db3661

  • Size

    1.3MB

  • MD5

    eb88b7b1d5512cfda898368007d30533

  • SHA1

    dc6cc0b4b51d57313670835937b2f4c82c5f908f

  • SHA256

    c4fb3e0ef0d0e323eca386f58696f701b0fa7644c1d0cbb680d3f218c2db3661

  • SHA512

    e49dd6b6507f0054d9f2c2f98763d4ea64eb7a5d5f3bc561ec0cc0ed7b0bb0746b827fe6add5434af6f0429c822a2a3ef4fd62ebc510ebebd40bb3ebdae2aa1e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c4fb3e0ef0d0e323eca386f58696f701b0fa7644c1d0cbb680d3f218c2db3661
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections