General

  • Target

    acf79e7f4e7c4fa0315b6e968470bc44e966d30fca16bde1c179ed95a7cf5079

  • Size

    1.3MB

  • MD5

    41f13a6a8c0a524cdde0115e1c7ec26f

  • SHA1

    4b0aa67cb5ddcc3bd08480dcfbe7503c73798f9d

  • SHA256

    acf79e7f4e7c4fa0315b6e968470bc44e966d30fca16bde1c179ed95a7cf5079

  • SHA512

    a5770034f5417a66547db301741275c71062337aec8738c755fe4d3bc26c746421e2691197e83b301acba8fdfc08a3de8c33b7f453987110ec05f049b33320bf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • acf79e7f4e7c4fa0315b6e968470bc44e966d30fca16bde1c179ed95a7cf5079
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections