General

  • Target

    4e2b0803f7ca73cdeab506668891032e0b8df84673a307d89cc73d02464693ec

  • Size

    1.3MB

  • MD5

    63fdf934abae7a224ef0cb86fff89d6c

  • SHA1

    2581fc6d72a4f20ba96ef1f869b33f49d27ef4aa

  • SHA256

    4e2b0803f7ca73cdeab506668891032e0b8df84673a307d89cc73d02464693ec

  • SHA512

    eb8037dbe16891ee362a02fe4867df97e285f29c084ec6d9ebbe394a635db61e98fb0567e6f1829f5673628ea492abf12a276b305dbe5191757d3559ebc5dc41

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4e2b0803f7ca73cdeab506668891032e0b8df84673a307d89cc73d02464693ec
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections