General

  • Target

    comSvc.exe

  • Size

    1.7MB

  • MD5

    62ad00cc2622a8b4799967d3432446d3

  • SHA1

    b996e520bc4371f8226690317b669e8404260b6c

  • SHA256

    6161de0f3a3fca46dd5189044f367f13b5bb88f6473a02d32858188531832d23

  • SHA512

    ef06f1070c83bd1aefbdbc1c57052b658986cf7860d1ae23ba2f6fd00791a71431735edc1aee703b8757ead6b8b4097f5760567a2a5f3646828295f7feddc0b8

  • SSDEEP

    49152:G/MFK5hftE2CQdLYlGU/qPWbQCVLsMhdzRNlbG:sMFA1dElGfWbQCVLsMx

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • comSvc.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections