General

  • Target

    ac748a7b41c8392df52ca2071d62bd2d3f457f728590de28cde9252e9c4428ed

  • Size

    1.3MB

  • MD5

    850ebd8bfb3e449c2c3c45b6eae40dd5

  • SHA1

    c32871a302d46fc4f6e4ccbf583f64f34b17c8e3

  • SHA256

    ac748a7b41c8392df52ca2071d62bd2d3f457f728590de28cde9252e9c4428ed

  • SHA512

    a958008a31f6287220f56677fc9ecdbbb37a29be6bbe79f2b5189f1aed6642fdc1307525e4e0db5fd39a58193ef83967e4f3ca7eabdfe2daad5e61b2d9ac6f5f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • ac748a7b41c8392df52ca2071d62bd2d3f457f728590de28cde9252e9c4428ed
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections