General

  • Target

    4f3fb8606567570fd55f7b3fc2e0132d5baaa283c412119026ba732e628c7e80

  • Size

    1.3MB

  • MD5

    124f8b80e551448e13f2dcacdcf3cdd0

  • SHA1

    b586c133c11462a2771a3e6fdb505a3f8c4ab4ab

  • SHA256

    4f3fb8606567570fd55f7b3fc2e0132d5baaa283c412119026ba732e628c7e80

  • SHA512

    e6e9dad8e1e12c9b9bd9fe4c03b6ee10fe157898b43b27e64bdc1f27bf7c3e02c05247451236b5aa23cae4f2514b8de9b7d2ecc783b9c21709616a4b4ed7e85e

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 4f3fb8606567570fd55f7b3fc2e0132d5baaa283c412119026ba732e628c7e80
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections