General

  • Target

    valiantspooferpaid.exe

  • Size

    1.9MB

  • MD5

    957ba1a651b750713d78d437ed8a3c7a

  • SHA1

    14fdc69fc21dc9516931f5227d5d66ac1598c69a

  • SHA256

    7b6a4e1d88e9c477ac1b77f3255a9daa54c083830ad81687cd45b2f237b8237c

  • SHA512

    c1ee2c80192b3f6a501d9958f49565111bdd7ee962fd05e5aab6af5fffc8bb41fb11f56ad590d60915271ecf2e9f774dd58472b6431b9cbebebfc9596efc85b5

  • SSDEEP

    24576:u2G/nvxW3WieC8cVmgkR6glsR3osU0Fn98UNnFihpdTGL48uZt+x4M2rPmG1GUXH:ubA3j8c0SUk9jcH8kjM2rPVr8sLN

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • valiantspooferpaid.exe
    .exe windows:5 windows x86 arch:x86

    Password: 123

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections