General

  • Target

    589e4b0167dc1a53f16f9ced4d9c31a5c7149c23aee65c8810bacc658fdd7f5e

  • Size

    1.3MB

  • MD5

    cd0fdd7c10be4794ccca13e30fd3606e

  • SHA1

    67d3dcd8cf151b8c92fe4e938b2b98898de865cd

  • SHA256

    589e4b0167dc1a53f16f9ced4d9c31a5c7149c23aee65c8810bacc658fdd7f5e

  • SHA512

    c175e4fdab6104599769b54fbb3fae40deb2f0e738599091e3b97c1629f3a7aac4f42f81e9794d7dd94c7975179833a680378caa39760c7a0aba58dd3678ce2b

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 589e4b0167dc1a53f16f9ced4d9c31a5c7149c23aee65c8810bacc658fdd7f5e
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections