General

  • Target

    e947fa91c7d6f325d9778e16c8c3c75cb3a1d1fcd6ba09c3aa03856cb3156e49

  • Size

    1.3MB

  • MD5

    1c67ee7630f2b123e8adec2285a8c516

  • SHA1

    b24e487db66f6333019007884839844aed8151d1

  • SHA256

    e947fa91c7d6f325d9778e16c8c3c75cb3a1d1fcd6ba09c3aa03856cb3156e49

  • SHA512

    3651f470657ff7bf0b4c44d70f4cb32f8f812e4940cc3e6febf54e26aa206c2892000e9d216866585d0fee3f9b39fd76c4b9207432c1aa350109b6a24cc9048d

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e947fa91c7d6f325d9778e16c8c3c75cb3a1d1fcd6ba09c3aa03856cb3156e49
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections