General

  • Target

    Hypermonitor.exe

  • Size

    2.6MB

  • MD5

    145f3b2c57807a1965a609b4a23f3041

  • SHA1

    8cbca74c7274dfe90a5975ba0d54218e257097c2

  • SHA256

    f625a27fb4ed8ae652cbe55b620eb52c4ac90f53dccfa857388650f596965686

  • SHA512

    216257fd3792a8098c77344df4545daff27927d297e1c5ead55bbb41627c27a9689d64a16ae4f5bc89021f2ba3fa5ea0974b728a765752f7762b6e594dd7f4f9

  • SSDEEP

    49152:OGqyxbvu0AfYl0u6BRhgxxxgypYv3N7eA7gLdv:OGvbWnfoy/c1Yv3N7eA72

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Hypermonitor.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections