General

  • Target

    7667bb93ae40bafe4cbc66624d127717bf5a31ecc3131d0f212cb3fba481d63c

  • Size

    1.3MB

  • MD5

    c62e9bedf5e7db592ea637cca10a1e4c

  • SHA1

    f93b4346e643a221fe9a153a711ade354cf9fa48

  • SHA256

    7667bb93ae40bafe4cbc66624d127717bf5a31ecc3131d0f212cb3fba481d63c

  • SHA512

    9f4fdd0533e5a9e9fa0e90d6e6de8b1d6cf03e2192945a18167407d4f76955d77ab3d5fd8c13642ca53bd9b27f15606a4fa8c39d201350afd45a99209745e38d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 7667bb93ae40bafe4cbc66624d127717bf5a31ecc3131d0f212cb3fba481d63c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections