General

  • Target

    c2f0a0163d7b93ba6c2d5c4a2ff83261f3f77f468b4068b3561596de69564fd8

  • Size

    1.3MB

  • MD5

    4aaf3e3ae8b7472af68a2de881e19159

  • SHA1

    649cf0483111fe061dc3d82777d21ed143a3160c

  • SHA256

    c2f0a0163d7b93ba6c2d5c4a2ff83261f3f77f468b4068b3561596de69564fd8

  • SHA512

    7f3e0706073cdec28f08365d7d0e87429517893973967ae280004f4e612c1d7fbdc6b8d69ba6b8b38d0017ec24f8d35658a36e2ed5d908ccadec831ae1e2bbe3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c2f0a0163d7b93ba6c2d5c4a2ff83261f3f77f468b4068b3561596de69564fd8
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections