General

  • Target

    714fdb8b36fcf10acccaf0b9bed06d48a40be2ad7f27e79f1a4f5228913c18fd

  • Size

    1.3MB

  • MD5

    4a3462caf25922dc4936be9b203ca33a

  • SHA1

    e3dfc0a9c9ee6b18b9cba104376a89024d086c25

  • SHA256

    714fdb8b36fcf10acccaf0b9bed06d48a40be2ad7f27e79f1a4f5228913c18fd

  • SHA512

    32a5eeb302fb6be4abd3922a2341a20a66d5742592c2fac4eb94d02e5c6d0ac781432faa9c2c8a8507a1607d552b4938c8d42a66628e57fd20c74824979bbbf3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 714fdb8b36fcf10acccaf0b9bed06d48a40be2ad7f27e79f1a4f5228913c18fd
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections