General

  • Target

    e34681f437c3cd8f7d4f10a1e487315dd14040b0c02a5e0d6b0a6f0f16e9b4c1

  • Size

    1.3MB

  • MD5

    dd84436a53896fc77789ff708c41b22b

  • SHA1

    426ea555d7cdcb824fcfb2e51a933e14d641778d

  • SHA256

    e34681f437c3cd8f7d4f10a1e487315dd14040b0c02a5e0d6b0a6f0f16e9b4c1

  • SHA512

    5ded2f2503cdb3d8dadc935506250fa880181373dc43d884720feb762a90576df3f235212bc64196bac208c2cf23399a64214a54601d65a534d8ba920f0679ec

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e34681f437c3cd8f7d4f10a1e487315dd14040b0c02a5e0d6b0a6f0f16e9b4c1
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections