General

  • Target

    b3c29b7d02661ea960fc5c6a8e6f4d66716ee7eaa071c127d2d80d348dfad729

  • Size

    1.3MB

  • MD5

    a10e0b95e76730a97bd523b9d0f14c59

  • SHA1

    562459b07254eeb7f19b81ea4432d67fe61473fe

  • SHA256

    b3c29b7d02661ea960fc5c6a8e6f4d66716ee7eaa071c127d2d80d348dfad729

  • SHA512

    5a0c89bdeabe2a0411efb6d34f58c019de8c095fbe2d9e633f280bba07f0b47456ecc022cf691295cdeae56ffd5eb3f8ddf2df2792bf36791660242183486c93

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b3c29b7d02661ea960fc5c6a8e6f4d66716ee7eaa071c127d2d80d348dfad729
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections