General

  • Target

    SSID Stealer.zip

  • Size

    1001KB

  • MD5

    0afcf903c6eda0f97ac8a0b0aa0ff62b

  • SHA1

    163a8eb1a5f2cb31d6a7f867141ebf27913133e8

  • SHA256

    47677991070278ca44873d576766fcb9083151f8479c4bc399461c727b5bfcdd

  • SHA512

    669a39eca76d93c06db5b43de6903db84482694bdcf40d8f6f9b74cc0a6cd9f308762fa163009d8522d2bf5b7131776a5e19aaea926f7169f6f0d4c1c8976602

  • SSDEEP

    24576:fVXkNEbpywglVk1QdeUBmXauzpVCtO7Sx/RhGlVA5wflQcUh3v:fVUGbkvVkGeZKuzpVY2lVOw9Q9

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 4 IoCs

    Checks for missing Authenticode signature.

Files

  • SSID Stealer.zip
    .zip

    Password: 7777

  • NCC2.dll
    .dll windows:5 windows x86 arch:x86

    Password: 7777

    f4d8783cad3f11045aa4e2ccd348ec7b


    Headers

    Imports

    Exports

    Sections

  • SSID.exe
    .exe windows:5 windows x86 arch:x86

    Password: 7777

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections

  • dotNET_Reactor.Console.exe
    .exe windows:4 windows x86 arch:x86

    Password: 7777

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • stub.dll
    .dll windows:4 windows x86 arch:x86

    Password: 7777

    dae02f32a21e03ce65412f6e56942daa


    Headers

    Imports

    Sections