General

  • Target

    DCRat.exe

  • Size

    15.0MB

  • MD5

    d4adfcf9065296e31a49327ebe642584

  • SHA1

    83f527cdb0868e772c0538fe64c68e71e8e38669

  • SHA256

    d958d55003daa3b5e322a920126104fbd93663b46803c8653aa0240aa1e80244

  • SHA512

    10942a219ec55be6c7324f1962fccff1281d0870b906bab03622d6803426db26fd3702ce350e4b05dae761031df155ff1248eb44a9fe627522f03a848f6c0929

  • SSDEEP

    393216:NdiQoFnY61ZmZZBFGndTMXdPpLNGxrkLzgTTP5b:NdiQoFnY61ZmXBFGdfrUIx

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • DCRat.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • creal.pyc