General

  • Target

    e00c2ecc7d5b2a6c17e68a142d3634b80e7a420cf86d15c7f9506ca10ac37e92

  • Size

    1.3MB

  • MD5

    d8bd0ab023fb0ff00a16bf5bf72eb65d

  • SHA1

    dd4fd9a6f39b1a6f99a0763a7d86886d0c68d243

  • SHA256

    e00c2ecc7d5b2a6c17e68a142d3634b80e7a420cf86d15c7f9506ca10ac37e92

  • SHA512

    2e519ad5ee36eabef76f359287838f9c0ddc97361ab16061ec38d4039abfa11465101a3bd3dcbca79930e3c144d13da486e9ef7642f8bf1f903a54104ef794c3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e00c2ecc7d5b2a6c17e68a142d3634b80e7a420cf86d15c7f9506ca10ac37e92
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections