General

  • Target

    ce6f5042d0263bd28f61199cc57df2dc786c1d8fd5f7d2b38cd6fb356dfe4f72

  • Size

    1.3MB

  • MD5

    8106067792978cd9d087bf453bfa25cc

  • SHA1

    950dff611f45f441a949dcf9827e452e1bd2c695

  • SHA256

    ce6f5042d0263bd28f61199cc57df2dc786c1d8fd5f7d2b38cd6fb356dfe4f72

  • SHA512

    a9a994cb1c02a5697bfe782034d3cb739b55d3e1895c94a3a832ba00b6a8a5fd35c641e5c6d1f6894d6e72a7974835cf9e0232091325674b36329814e500dceb

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ce6f5042d0263bd28f61199cc57df2dc786c1d8fd5f7d2b38cd6fb356dfe4f72
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections