General

  • Target

    b4b8f8eac1e4dec2144108d5eec3929ca0660b345fa2468334fd430570e32a71

  • Size

    1.3MB

  • MD5

    dd27bb5718337a0dca0169984f4d3658

  • SHA1

    092c747dc2df315f87d5c97b464d076a26fc583f

  • SHA256

    b4b8f8eac1e4dec2144108d5eec3929ca0660b345fa2468334fd430570e32a71

  • SHA512

    863a703f45ec350541ce4633c3913725a16b1f7e98e5d3c2ea82a5576df6d531d2e4b499f6d6a1408a555d8688ea34300d69acfce2d95de0d5e076de503db252

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b4b8f8eac1e4dec2144108d5eec3929ca0660b345fa2468334fd430570e32a71
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections