General

  • Target

    fe64a17310b705b6bfccbc44eecb552f0139ca7cd814757dedbf48ad6c81fab7

  • Size

    1.3MB

  • MD5

    3c0c24b62287010d9d3fd1601bf5ca08

  • SHA1

    f082001eb054e6ad4c89b027568ad43b95a94e18

  • SHA256

    fe64a17310b705b6bfccbc44eecb552f0139ca7cd814757dedbf48ad6c81fab7

  • SHA512

    c973c72baffee4347c25a70aa65d4f2a25648cef2a723c3a6f5f1c4f6617882171589c3ce2e0b60359631db5ead6ac19c33b4d9f0f529b438db6e8d73870d54f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • fe64a17310b705b6bfccbc44eecb552f0139ca7cd814757dedbf48ad6c81fab7
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections