General

  • Target

    a53aa6d4664d7905074b2774a528c6fbe300435c15c8c05aa2c18e4237ea3589

  • Size

    1.3MB

  • MD5

    575032b38f6ac3306c322531f77e472d

  • SHA1

    1d12375a4b08e33613ff215076f929b661717dec

  • SHA256

    a53aa6d4664d7905074b2774a528c6fbe300435c15c8c05aa2c18e4237ea3589

  • SHA512

    d860f062f7a5078cd5b8bf1fc8d0561aab66d9d6a904b9bcee793230860188b21755db2ec53f26815ac53059ee7fd770fa62fc5a332c087d8ef2e24dfdc51bf4

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a53aa6d4664d7905074b2774a528c6fbe300435c15c8c05aa2c18e4237ea3589
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections