General

  • Target

    6c87e88c866c32e968c3be8f08d4473b957ec50aaa0945a7078a301f83e42aff

  • Size

    1.3MB

  • MD5

    53ab9ac039a42fcee4967bbc659ca54d

  • SHA1

    0420b770587a9ce0b52be6d991ec87884463287f

  • SHA256

    6c87e88c866c32e968c3be8f08d4473b957ec50aaa0945a7078a301f83e42aff

  • SHA512

    201afec067bc47d2516b8b4dbefe471f2713e14bb315d7278197ecec5c28616713d7264b4df239ec8f010f2143c16f5dddd06266986ae4f3c7902f9d1f80b84f

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 6c87e88c866c32e968c3be8f08d4473b957ec50aaa0945a7078a301f83e42aff
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections