General

  • Target

    df6d0bdbe4c2b7a300cd1d96e87b3cb7dd5b6abe7111c2495ef8b28bae2a5251

  • Size

    1.3MB

  • MD5

    167a035db0023f505cd83d653cf1fdc0

  • SHA1

    7edcfe8e543ae86430a1a58f987e1c3b87c63911

  • SHA256

    df6d0bdbe4c2b7a300cd1d96e87b3cb7dd5b6abe7111c2495ef8b28bae2a5251

  • SHA512

    f8451d37660fca5c38141a7294482fa819a9a85a41e99aaaaefa240dbe057b4e9ccaa2023c889383344992e1ff493f2726849e89be10a421ba60b269f171be5d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • df6d0bdbe4c2b7a300cd1d96e87b3cb7dd5b6abe7111c2495ef8b28bae2a5251
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections