General

  • Target

    c06ceaaa5c304e4d76cc2f559e6f881e74a809a3ac16fb318f15ccda178fe6f6

  • Size

    1.3MB

  • MD5

    a3cddd3adc3ba979cc870175f23c2edd

  • SHA1

    7ad037d8cc8ea26a829046fe8ff0f1516c578e25

  • SHA256

    c06ceaaa5c304e4d76cc2f559e6f881e74a809a3ac16fb318f15ccda178fe6f6

  • SHA512

    e9b4c0bfeeb47dea8c3c1d4ef86379d701079d88ca2a61e95b3f93f8b5edc0f7ac9143c5c564c69109e86cb7dbee1d8a94452fd39cf47a57d5dbdaf7e6f03eb3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • c06ceaaa5c304e4d76cc2f559e6f881e74a809a3ac16fb318f15ccda178fe6f6
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections