General

  • Target

    bc43f71f7be162f14cd1b454f7937d9b6b71ab7f37ed7183de31b1d511c2f879

  • Size

    1.3MB

  • MD5

    8a4bbb602f563c43706a4a49a265d4b5

  • SHA1

    91c2a7ffca5e91b060cbb50e7256bc398499e28c

  • SHA256

    bc43f71f7be162f14cd1b454f7937d9b6b71ab7f37ed7183de31b1d511c2f879

  • SHA512

    d1f9790d997340501df37bdaff12ab797d50d2b80b316151017ceae7d3243cc25c621bcf10b94b710a7b4c3af5043a75a63ec5a8c2bf5a7cbee14a860388d8cc

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • bc43f71f7be162f14cd1b454f7937d9b6b71ab7f37ed7183de31b1d511c2f879
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections