General

  • Target

    dfb0a6a4aebc5dc40dde1bd3dc506a33987d34d9930d9f68450a55f1f1c950fd

  • Size

    1.3MB

  • MD5

    7857f78011b2a564584ddc3a6e2010fc

  • SHA1

    b68ad3ae2f623f0a8aafcf59653c55a1123b2308

  • SHA256

    dfb0a6a4aebc5dc40dde1bd3dc506a33987d34d9930d9f68450a55f1f1c950fd

  • SHA512

    c01d35aaf024545a1e50200a15fbc7eb87ce05abde15a9088da4b9403c94d3e816fb0387415155c475c56896b6661c33eff05659d91c390ac5df039efc4463bf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • dfb0a6a4aebc5dc40dde1bd3dc506a33987d34d9930d9f68450a55f1f1c950fd
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections