General

  • Target

    61cbb21bcc559a88d2e8365d6a2abb738faf56acd0e0b2f259235621d14fd71b

  • Size

    432KB

  • MD5

    acb27404509c805c987907344c13bee4

  • SHA1

    a99585d4376067700047258c0294f3ea890358d8

  • SHA256

    61cbb21bcc559a88d2e8365d6a2abb738faf56acd0e0b2f259235621d14fd71b

  • SHA512

    bcf7d26aac2f4048c710d9100ef0538d20bf6f1c4925eb9060808d5b25c08fa0ef35e46e6226de745d06c6120ceff06f1b5acfb53c2161bde40570f3c42dddfc

  • SSDEEP

    6144:nDcd3kwnU2IGXgyimt41oxHPzfW9k+T97ztuyWYZ8Ta:nDcd3kN2xgstcoNbik+T97z0Fa82

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 61cbb21bcc559a88d2e8365d6a2abb738faf56acd0e0b2f259235621d14fd71b
    .zip
  • {VKK+KODS}/Vkk.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • {VKK+KODS}/vkk.exe
    .exe windows:5 windows x86 arch:x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections