General

  • Target

    eb7ad52f1276a4856fe0768ef0c9caac0a09157b1f9c1e8db2b8e558a41c8000

  • Size

    1.3MB

  • MD5

    1d77d0a96fd74dacb3b15ba40752e463

  • SHA1

    4db077d09d7e2affe83858b3867ff18696ff5600

  • SHA256

    eb7ad52f1276a4856fe0768ef0c9caac0a09157b1f9c1e8db2b8e558a41c8000

  • SHA512

    1970ad715fc64588cca110d7efd47a84d402a0eb5c4bf2a45c1d3acd116cabc1e460b6108f680a2fd6dd4142ff34515117f40453107b2e0563019d91d00dc451

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • eb7ad52f1276a4856fe0768ef0c9caac0a09157b1f9c1e8db2b8e558a41c8000
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections