General

  • Target

    ValoTriggerBot.exe

  • Size

    3.7MB

  • MD5

    6ef75ad72423a0fec44a0f5ecfac0375

  • SHA1

    8ba20f1eb6ea94e593adfb7108ea21d84dc106dd

  • SHA256

    54dec873fa26b004cc5d08af2f5c812e9eeb5fb67581d159dc116373d0fa7330

  • SHA512

    ce5473f4d4ebe0d7244a63d2f212ba8c5f9d43fa9f71d2dd9b722c0458abdefbae46231a39c2d1ac28b3ef6a81b11ea88c0a4bb16e1cb1e0b67f0542b87340d8

  • SSDEEP

    49152:qbA305LNZP4tQyOfnD60xXue0RGBcAjPPOY9VAPoFlnqBvumZZH3:qbVhZP4tXOfvtYniOBm2Z9

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ValoTriggerBot.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections