General

  • Target

    ee300b39d9b833a566d9b4471806f14b3b7be93941b202344d42b70aa8741583

  • Size

    1.3MB

  • MD5

    b7dc39471df60ee4b7ca1039b9f676f1

  • SHA1

    376163c50324e59d29c4f9c36e481ff3ef5a1a89

  • SHA256

    ee300b39d9b833a566d9b4471806f14b3b7be93941b202344d42b70aa8741583

  • SHA512

    59117e1e0f6e852884e3b5908163a1065047c7f53fd2c518923fda5457bad90084a3d80b5ae65990e8d068e543770c7b29b3e7630ead50b0bb748f188ec15efc

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ee300b39d9b833a566d9b4471806f14b3b7be93941b202344d42b70aa8741583
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections