General

  • Target

    4a4b7b69e4e1296c6560d7a1678ea92ffa23244af6d9a66cef2ee5551aefad88

  • Size

    1.3MB

  • MD5

    a9bc9f119437e202ed57fc54b04b271b

  • SHA1

    8e3e2b3bb4b30037b399ddd7d7695ff46ca34918

  • SHA256

    4a4b7b69e4e1296c6560d7a1678ea92ffa23244af6d9a66cef2ee5551aefad88

  • SHA512

    95d8a3c344d0793599b575d079555be29584e6192e1479528a7d7753dd2db8891d5924ed674d2cc20d2ed585aa87cc05ca9a7a9db758b295f6f23d122d61d407

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4a4b7b69e4e1296c6560d7a1678ea92ffa23244af6d9a66cef2ee5551aefad88
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections