General

  • Target

    f4eb4f8a9a32c3747ca2de37cc23d90d56746d08888fa7d0cf0749a0aea53f3f

  • Size

    1.3MB

  • MD5

    d2c3bda3df4b992dbcc0553bfa22404f

  • SHA1

    1def4aec929adeb07563dfc0205163daa243b443

  • SHA256

    f4eb4f8a9a32c3747ca2de37cc23d90d56746d08888fa7d0cf0749a0aea53f3f

  • SHA512

    230bbc4831ac976f3e37f89a7a8e07a9f0f13251aba0e4962d662e2d65f757a9386e73d65ce25c353756bd040f43c7d052157208b4b3a1995e65afb94e3e78d9

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • f4eb4f8a9a32c3747ca2de37cc23d90d56746d08888fa7d0cf0749a0aea53f3f
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections