General

  • Target

    e754e10c5a7be2a78ec1c2156bb60cca8195c1f3ec84a738a74d35287deb9231

  • Size

    1.3MB

  • MD5

    fe0cb680226f66f502af96f7c0f87352

  • SHA1

    acc1a91ea98b13f0d381515a2ed9303b377e4139

  • SHA256

    e754e10c5a7be2a78ec1c2156bb60cca8195c1f3ec84a738a74d35287deb9231

  • SHA512

    4da00a837bd02a131750cc990ed5658f491b8680ed16b26d2b772fd8515b07500639b6d78122b6df60e82b3c942a08ba52730b94de61f81cf5f0d738567c4163

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • e754e10c5a7be2a78ec1c2156bb60cca8195c1f3ec84a738a74d35287deb9231
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections