General

  • Target

    5caeb7a57aab938c1f10ac7a65a5163e00840b36e2f03fcedcd5c2ffc5c4c012

  • Size

    1.3MB

  • MD5

    c7526ef52dfe5f4cadf382e3d0202e6b

  • SHA1

    2d6cf4d474f5cfcad7cb2e4fdc241234b0283960

  • SHA256

    5caeb7a57aab938c1f10ac7a65a5163e00840b36e2f03fcedcd5c2ffc5c4c012

  • SHA512

    2faa6695b93f3ae1c7bc3b418a1fa0c46b3475e477a70272968e1dbafbb25a919b57ff32713eae61bc6bf048761da2e13ac4ae24907c26c089f69c4cbfabc81c

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 5caeb7a57aab938c1f10ac7a65a5163e00840b36e2f03fcedcd5c2ffc5c4c012
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections