General

  • Target

    b5962ff163bb7f67acd1950c2bb7b88c32cd2c28fbdfac9c8358cae1e0837488.zip

  • Size

    574KB

  • MD5

    ef11e48896b85fa20976f0402f05a9cb

  • SHA1

    3cacc922915f7b3cc2e39b81a47d555bf8ecf8ae

  • SHA256

    302d61426e89ad4c0f5d3872ba592f9e798940c2e8f4a99d3b6142b4218e7296

  • SHA512

    699bfca0aba12cb8738aa55dc19ff4a40e8fa52e3bd76866711c8156b78480769c42e755d24f7ea212bc3e71a5ed7e1599a34849025aa76251879e0aa0cc65fb

  • SSDEEP

    12288:0OdUnAOj0kK0OtPtBCtNkgOZoSeoQzcgjN7rVP45qXe49GKPuhbWhy2:i9jmfPtBCtNkHZmBVxXeKPu5+y2

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • b5962ff163bb7f67acd1950c2bb7b88c32cd2c28fbdfac9c8358cae1e0837488.zip
    .zip

    Password: infected

  • b5962ff163bb7f67acd1950c2bb7b88c32cd2c28fbdfac9c8358cae1e0837488.exe
    .exe windows x86

    Password: infected

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections