General

  • Target

    HEUR-Backdoor.MSIL.LightStone.gen-1628ba3aac3d972870ff0ecb3ec0576511d76665003051c8d3cf6025c4a6ae30.exe

  • Size

    784KB

  • MD5

    d71b38b89a14c75d9a9251440f7bc183

  • SHA1

    b2f5d0b7c245ff4999abc15c20372e2369acba59

  • SHA256

    1628ba3aac3d972870ff0ecb3ec0576511d76665003051c8d3cf6025c4a6ae30

  • SHA512

    b77ed14a995ff2a5aee9741ae8df5663b28d093a6ba2bda52e3a2dcf51c5056b97774365c06469c0fedc6836fd3a3e32ec302f84323e3a5ca9dfa652ca3c7b98

  • SSDEEP

    12288:eqnO8YpD1oOJp+Ce1PSiG2jfIBoI5DyDwYMDxFesH0ioBw7oKk2:e+ORToOWSi5gBoS4wYUJ0eo2

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • HEUR-Backdoor.MSIL.LightStone.gen-1628ba3aac3d972870ff0ecb3ec0576511d76665003051c8d3cf6025c4a6ae30.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections