General

  • Target

    1c0e670da2fe1124d8beab0e5e41ee97b6f066aa56a90c296aa4738874c5dc65

  • Size

    1.3MB

  • MD5

    8bb3941a581af8f03797e4c78179ee36

  • SHA1

    b90f84adf8947c73ec7ae2e2716fb8fe2f4d6bca

  • SHA256

    1c0e670da2fe1124d8beab0e5e41ee97b6f066aa56a90c296aa4738874c5dc65

  • SHA512

    44d8a17e0bc4d5c2dff0bad0fe03b0db3066977288e3a2a159d8d6800c63a47ed8d7166843f5095e317c88d3fcb29cc93f440a921d992e7539a352f034ca04b8

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 1c0e670da2fe1124d8beab0e5e41ee97b6f066aa56a90c296aa4738874c5dc65
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections