General

  • Target

    d3ac9e0cb6d8142c42d3136114fddc35b9be88e7ad36055600577dbda8924e3c

  • Size

    1.3MB

  • MD5

    532c01cc86e0e672b354f04497b8ffe1

  • SHA1

    8ec82bc0fea9f02244bbec132914bf44f4ddd522

  • SHA256

    d3ac9e0cb6d8142c42d3136114fddc35b9be88e7ad36055600577dbda8924e3c

  • SHA512

    3393a8cd9274a10549f05cc48f0875727b9aee6a2c22fdaea367b19d4951a8c7d1e8f6bd1a92f83f8ba38f9e60d246a3d7e2275f69d0e2a547d6f3db4fa448c3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • d3ac9e0cb6d8142c42d3136114fddc35b9be88e7ad36055600577dbda8924e3c
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections