General

  • Target

    Auto-Teleport.bin.zip

  • Size

    6.4MB

  • MD5

    7c17dd10086eba81d73eda23b43b0e0a

  • SHA1

    b8f40dbf1a9dc13074b842b82fd38ee683876210

  • SHA256

    6591100db6dfa913b961acdc52b6b7bf3089b9292af7500c9bb88abf0857180a

  • SHA512

    d821c5bf2dcebbc1ce36611ace528b61f614cbb337211dbb6dff1a9a03303cfa75be8865f4b5c941089810024ccdff9e81ba6113024e255a54cea96d6e550957

  • SSDEEP

    98304:ypFn8hosJEbP2y+wtUh4n9IPixO2cGLm+OyFuDHXgsAtp57y1Cg:yb84C9CuPiwHGqyU7itpRyj

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • Auto-Teleport.bin.zip
    .zip

    Password: infected

  • Auto-Teleport.bin
    .exe windows x86

    027ea80e8125c6dda271246922d4c3b0


    Headers

    Imports

    Sections