General

  • Target

    1ef024e691831de3cf5d9e9a59f5ae2963948ec8aa7d955ae37853dfc40ae437

  • Size

    1.3MB

  • MD5

    261173fd4fb188426a4888cb8ec4920f

  • SHA1

    3f73d30c65d9dba4564b405b584b02738a57bd9c

  • SHA256

    1ef024e691831de3cf5d9e9a59f5ae2963948ec8aa7d955ae37853dfc40ae437

  • SHA512

    8b4c0a1cc40d5a4a448752147c61d4eeb82b53d9bc1d8b961046f42f1c2251c69d3c549bf21b52d970ad401259edefc531334f92a8d584749ead9f9e354b85f3

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 1ef024e691831de3cf5d9e9a59f5ae2963948ec8aa7d955ae37853dfc40ae437
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections