General

  • Target

    b57b8ed4d1e8e334c5b3ee818ed6e2ca87b9135c3adb09a4d1dc77ae1960375c

  • Size

    1.3MB

  • MD5

    5f72e70f27780647a3a1ba5ebe69a8f3

  • SHA1

    b54881a6caad66b76f757c95e765edad2a79d888

  • SHA256

    b57b8ed4d1e8e334c5b3ee818ed6e2ca87b9135c3adb09a4d1dc77ae1960375c

  • SHA512

    7fff01075218798356a14dcecba8db25df06bc7620272f09310155f4dcab362bfc8fa9b3d0376a180a0e88b7dc979f5ac8cdaa8b3b2da7c2e4b8f41825988d61

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b57b8ed4d1e8e334c5b3ee818ed6e2ca87b9135c3adb09a4d1dc77ae1960375c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections