General

  • Target

    HEUR-Trojan-Spy.MSIL.Stealer.gen-cd3005a4493f.exe

  • Size

    1.1MB

  • MD5

    5fe97e4a097b31b1741ac9dc924981f7

  • SHA1

    0e602ffffe96be428e680484f88c2c0d4e281f69

  • SHA256

    cd3005a4493f4ca278985f4a25ceee50b851f8cb82157984111f8dd3ac80fb54

  • SHA512

    993258e5f182bfd8a8d8a1e9b9b6705f21a76376f852637a34f37afbe15b7cca03bc8e44e542cc197676dc69e12e9612a643044e3d315c57d7e9554aae4abe54

  • SSDEEP

    12288:SOgCrNyxDJB/n9jp8N1Q/wpZFgColPhY1K8DlR1sLdcNy2qNQUqn4:pgANWDJpk1bZW/7eEcNyfNQU+4

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • HEUR-Trojan-Spy.MSIL.Stealer.gen-cd3005a4493f.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections