General

  • Target

    410b9bab1cd50e3620cc4b2a6b34db8e4d9b8cd8c863de7494422d094f6c42cc

  • Size

    1.3MB

  • MD5

    cc07ad57f09917f64c760f262d08c8e8

  • SHA1

    cf68d2c6ce6cd94d051c3fb6c7a52ab197ae6799

  • SHA256

    410b9bab1cd50e3620cc4b2a6b34db8e4d9b8cd8c863de7494422d094f6c42cc

  • SHA512

    4e89870e300e5893fe54b01ddc19bf6f5b05fbbd258ab3b7ae47cab979a1fd828cbb960d667a1a3af54daf2d8391197f01eb5071cd3ca819c4260342d523b9d6

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 410b9bab1cd50e3620cc4b2a6b34db8e4d9b8cd8c863de7494422d094f6c42cc
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections