General

  • Target

    39e82c7e5c031177423b768dddd63ef01726f9dc3f1c8bed3b9dd3fde09d9c3d

  • Size

    1.3MB

  • MD5

    955bce7f0b1e8b9088a356546a801e7f

  • SHA1

    3494c7283fe9c5b382f587a0ee6536637122e3bc

  • SHA256

    39e82c7e5c031177423b768dddd63ef01726f9dc3f1c8bed3b9dd3fde09d9c3d

  • SHA512

    f39dcd4c6d9b2c231c6e81c74844bd487ad9543a6c67b4441e2599ce5c0da56900d153213696ce05cdb90258d6770c076c631fe0f339fce5c14bdd1969e189ec

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 39e82c7e5c031177423b768dddd63ef01726f9dc3f1c8bed3b9dd3fde09d9c3d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections