General

  • Target

    c9238c5914f317b690c1e5fd2b27dc0d5eaa58ba1e1568329bc13d1b6729315f

  • Size

    1.3MB

  • MD5

    862b73d9da3e7b1b9bb999804aadf101

  • SHA1

    b9cb1b6eaba659d8c20de108d9259cc7c715a02b

  • SHA256

    c9238c5914f317b690c1e5fd2b27dc0d5eaa58ba1e1568329bc13d1b6729315f

  • SHA512

    a1176d7f36147dc915b4ddae2ed27710a80f3d65bde4b2255bed37b705bdeaf3306aa443151adf0821cd5f85ea7ec39cf402faa3b8b3dc2639aaa2f21a2a39bf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c9238c5914f317b690c1e5fd2b27dc0d5eaa58ba1e1568329bc13d1b6729315f
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections