General

  • Target

    e0e6c91af0659f267a21f7636f81a8f4c1fb7422a46b0fff8ac877584d8906f3

  • Size

    1.3MB

  • MD5

    cefe3e562af73c9d2d4a777227a880c5

  • SHA1

    3ef005ca40ee930c68b8e26f80399d62087c1d1d

  • SHA256

    e0e6c91af0659f267a21f7636f81a8f4c1fb7422a46b0fff8ac877584d8906f3

  • SHA512

    ca57b89018ef15985aef9327ac4c7e69ddaa9c000302defa1d86ab43512467f075d5a832e86f0adc3d198ce24636733db95d37ac2fb755bc30476183a6cfe494

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e0e6c91af0659f267a21f7636f81a8f4c1fb7422a46b0fff8ac877584d8906f3
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections