General

  • Target

    DCRat.exe

  • Size

    16.6MB

  • MD5

    a33e3d785f286e859036e3b77365bc2b

  • SHA1

    15f4167e2dfb1f828ae9f2a0e8d375efa98f14ac

  • SHA256

    ce2f66d5928928f4cd6f0b2b7fcb3afdda5356c19816966b3716f78fbaf79ac0

  • SHA512

    e37835a556b3d7be17891d1dd96b8757b389b6fdd50c31bf83d28ee9495a9ef8a4c45c5e4e69bc3fc7b516139e309ab927b458c8a04f2b866b70d9ac37617bdf

  • SSDEEP

    393216:sEkZQVBl86ODlHTE9Nj+CEDJKRW3I1KpnP2elMOdNP:shQVj86OpgeCEDJKRWPpBx

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • DCRat.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • creal.pyc