General

  • Target

    HEUR-Backdoor.MSIL.LightStone.gen-eb003ee23ef.exe

  • Size

    1.2MB

  • MD5

    2493fec769cdc844e2a7a2f0d610ec00

  • SHA1

    c37a9fef3a0e373b82f44798e042fc2a09221e85

  • SHA256

    eb003ee23ef2d78631a2ff8bff716d6fc04b6234a0b4b4de1045fff3c7125c43

  • SHA512

    2a10a2f39807ce629885703a6d9c1f4aa94e896ef87d229503c3c0aa3dc97136fda3e1e1afb96a3f35af7eacb6c831e13e70729e898173a78aee152d459a0c01

  • SSDEEP

    24576:bIqtD/bAE2g5Az3/GHFWFEHIol+EGxOzT+4:/JomIMvGEzi

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • HEUR-Backdoor.MSIL.LightStone.gen-eb003ee23ef.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections