General

  • Target

    2c9a93c56433bc2c1e8a64ed2e2fb899aead13a0c155fc5a660ac4c9ac16eb92

  • Size

    1.3MB

  • MD5

    f03d90135f0b13db73a7625a996c8acc

  • SHA1

    7185a3e15b00a63cae507d2d102b0bc68d0fa322

  • SHA256

    2c9a93c56433bc2c1e8a64ed2e2fb899aead13a0c155fc5a660ac4c9ac16eb92

  • SHA512

    b8446d6e4462064d9a9437b0fcf4e46e8d2e8b9c15cd424cdbbcf7651dff31644e3dbd7ccdb7c7b486a4a5912f197e3a2996bbb78ad746b5753e970411c33d6f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 2c9a93c56433bc2c1e8a64ed2e2fb899aead13a0c155fc5a660ac4c9ac16eb92
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections