General

  • Target

    f34e02a8308963f6747815d06ba8fb5c12b2b91a988ca3b81b1799f435b8dced

  • Size

    1.3MB

  • MD5

    c941e062112198d0e960b9dfd89250e5

  • SHA1

    a8b2f48624a457a580e5897beaf0c7d14cb47cb1

  • SHA256

    f34e02a8308963f6747815d06ba8fb5c12b2b91a988ca3b81b1799f435b8dced

  • SHA512

    cce522b069fea60d166529cfb8d74c19c381080ecc031edf31e91e056b01e0c035d3d88f601643d4bc38e2f83a4b933f7633523286e3f4c00343cce8a5ff4a6c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • f34e02a8308963f6747815d06ba8fb5c12b2b91a988ca3b81b1799f435b8dced
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections