General

  • Target

    529f8c969808488a83b7b16d1aa4a4e573c8bf2873c999fd382a5e977edf1c7c

  • Size

    1.3MB

  • MD5

    be61e2aa26200d7da0b08df2961b2957

  • SHA1

    c735b78d46d4695cbe99b0b01d2f9934f6da6a6a

  • SHA256

    529f8c969808488a83b7b16d1aa4a4e573c8bf2873c999fd382a5e977edf1c7c

  • SHA512

    8a2645497b63e3e77b3b7815d35f5e76a0ddcce1366b0845ab278a4053aba1d668e8a622579ab74a7975e6b6d03a8d68d13f7629a45983791a18862dc19dfe22

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 529f8c969808488a83b7b16d1aa4a4e573c8bf2873c999fd382a5e977edf1c7c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections