General

  • Target

    a4a0b2fd5cd2f9c6fea4678f85a63c3e52ced1aac997bdd086e7675c53d14f73

  • Size

    1.3MB

  • MD5

    387f524c9bca718859bbeee1d518805f

  • SHA1

    021ee05154a27a1cc53313537c1035d20f84138a

  • SHA256

    a4a0b2fd5cd2f9c6fea4678f85a63c3e52ced1aac997bdd086e7675c53d14f73

  • SHA512

    a06ab5a1ff5d084d30ebde8c26a1fd4b301e7019d1d84cbaf3fe1740b69590cbaf5e3ff87b8de7f1687869d15aaae65915d9de7992042fb7c464ca434af60cc8

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a4a0b2fd5cd2f9c6fea4678f85a63c3e52ced1aac997bdd086e7675c53d14f73
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections