General

  • Target

    c921e8c0e2b7c2f32c0a3353229528fcc312a39fcd19dda3cb926e68c74d2f5d

  • Size

    1.3MB

  • MD5

    e7859cc6697477ca44dc9465d76dfc1c

  • SHA1

    7b011b3e2e98b1809523806016cbed035410738d

  • SHA256

    c921e8c0e2b7c2f32c0a3353229528fcc312a39fcd19dda3cb926e68c74d2f5d

  • SHA512

    9059e10c0a662a9f1374f89435f63a055ba883ece555ceb2264e3abb815aee5bc270c89247242421aa0f184200aba7a2d883dd2c3a7988d1aecd20fe6805cb8c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c921e8c0e2b7c2f32c0a3353229528fcc312a39fcd19dda3cb926e68c74d2f5d
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections