General

  • Target

    f7de68b39db4e209315ede34d0df0e5f19bcf12b3bcd23e1b4fc46f29da86862

  • Size

    1.3MB

  • MD5

    939ab65d0afd442ba9f953a06e7d5eaf

  • SHA1

    fd07b5baf7e3c419717b7d639522bbd3300a1e4b

  • SHA256

    f7de68b39db4e209315ede34d0df0e5f19bcf12b3bcd23e1b4fc46f29da86862

  • SHA512

    743d6fc58e64d75686be08172d1bb3978b2983c72a3ba4bdb131c9079e6d8bcccb1666cd783c23db74c911048dd203182407fd69b6db18c576e6acb258bf8aaf

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • f7de68b39db4e209315ede34d0df0e5f19bcf12b3bcd23e1b4fc46f29da86862
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections