General

  • Target

    cd4c0704c0f07782dc17aa68d3ed339faea9e67febe058224e9b2f3e5b2bada3

  • Size

    1.3MB

  • MD5

    3cb1cda4050844d6a1a1224226877a38

  • SHA1

    a64e81e643bb601fd9b198ffb5046904aba48a69

  • SHA256

    cd4c0704c0f07782dc17aa68d3ed339faea9e67febe058224e9b2f3e5b2bada3

  • SHA512

    3e84ebf583f206bb7c2513bf8ad6ad5164864dd8fe2d6f0ca0667e62cf2efdf746d63321c0de04659db1a3a2f58283f3114b958fe0675e48ba96e8669657b51b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • cd4c0704c0f07782dc17aa68d3ed339faea9e67febe058224e9b2f3e5b2bada3
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections