General

  • Target

    f23f1460fc3a59a4709b64ab636ff9a5c1c2f9a4ac4f7d3b78f8a3b59e2c480d

  • Size

    1.3MB

  • MD5

    cd516ac748e19e7d9f07af86588ebdaf

  • SHA1

    77c43a9d188f040956ec292a5e45357f70c15877

  • SHA256

    f23f1460fc3a59a4709b64ab636ff9a5c1c2f9a4ac4f7d3b78f8a3b59e2c480d

  • SHA512

    611d01611d6ad3079534b01a0abc0bab43aece2f62b3ac0ae195eae3fbc53d178de549c56f2cd4b8fa4972cc4f94e4eb9c89e898defb64c6136bdd8c07b683b8

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • f23f1460fc3a59a4709b64ab636ff9a5c1c2f9a4ac4f7d3b78f8a3b59e2c480d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections