General

  • Target

    b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e

  • Size

    1.3MB

  • MD5

    21cf8c9db48f0e9680204b3214c0ee7c

  • SHA1

    47f18a61e60f493cc581a9e1456eea5b8260ab2c

  • SHA256

    b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e

  • SHA512

    57a17dcaca17ae88996c39796c94d2863433aaf19492575931cf4c5db976e7c6704644c1bd01547646f9fd6dfcd6c64d2a984e6f5a1c4f2ffed9944e4eb33758

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b3f294f12f9ff3c566578548c58079dbd4a61a86e1dc88bfa1f19d55204adb9e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections