General

  • Target

    eec0aaf26d0c4e9e378cf295c61a8d27aa51e9b8c3ddddc349b9bbfc09e07ebe

  • Size

    1.3MB

  • MD5

    9c712bfaaea118c2f370c2d6139414ac

  • SHA1

    c403e3939c2073b26c4c94d0432070b9c7677bf9

  • SHA256

    eec0aaf26d0c4e9e378cf295c61a8d27aa51e9b8c3ddddc349b9bbfc09e07ebe

  • SHA512

    e566ca7695eaae6550b25a376dc843534e56a5bbb59a97d872942fa0885b9951453be0e9f41ec6b2056ea226a91c4494272493947a1f93e52a04fc4401c405f1

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • eec0aaf26d0c4e9e378cf295c61a8d27aa51e9b8c3ddddc349b9bbfc09e07ebe
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections