General

  • Target

    SIR010101.7z

  • Size

    445KB

  • MD5

    ceba64f3d84613a8fa6cf049534c773a

  • SHA1

    aa8f45917ca45b9dea422e863a63fe285ade9c42

  • SHA256

    75e51725ddf846eb7b8b9dc8798035201118c7d4439e7a01b7f57ad515b69757

  • SHA512

    fa73635109d0e6081fc020bb1999f43cde67d01acfaf7062ea74fe570d1435a98af71399e20f971eda208207e036da70ead60b58891808398bf5948e7f05a484

  • SSDEEP

    12288:mmD6Fl08IKEt7IayFTtMOp2Lslnm4sncE7Za:mhFl0yEWv5MMzhsncE7Za

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • SIR010101.7z
    .7z

    Password: infected

  • imports1.exe
    .exe windows x86

    Password: infected

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections