General

  • Target

    a44b9b41730eaa9efa709df5f4a0a01ed1511f2fc8741e2c27913a64f0e82a04

  • Size

    1.3MB

  • MD5

    c61cbf99ddd20737baf85d43b480dd41

  • SHA1

    712977818acd3b7b7f9404c28ea5c73c22f1fd64

  • SHA256

    a44b9b41730eaa9efa709df5f4a0a01ed1511f2fc8741e2c27913a64f0e82a04

  • SHA512

    52674d76dc961221f2db724766b2bd99e9cd487cfe5da4e8aa35564e21b2967addd039d723160a77eaa1cb701a8d8e3c1ed80628f55a7ee0f4c654744bd6ee8b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • a44b9b41730eaa9efa709df5f4a0a01ed1511f2fc8741e2c27913a64f0e82a04
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections