General

  • Target

    bot.exe

  • Size

    3.2MB

  • MD5

    d9f7208d0116dcde22ece5048ac6c37d

  • SHA1

    f9b23d695bb875f032292983fe537c48bc02a657

  • SHA256

    15ba1de7e069b6615cc13a43cc2b50426065e92e018066b0e3a3af43bba522ee

  • SHA512

    152289834cfcf4fc78bd0799a78752587b06dd1c839ee46e050a03c99e1d527de995bd9430fbaee6da3d999293f00dbaa1d07736137e08c7740d5edb7263b114

  • SSDEEP

    49152:ubA3j4Ovfe+uuyV5rPOf82wtPXbGuTVHXZiyF3U5zKY7SeVZ9:ubSvfmV5kjwVbLXq5zKY9VZ9

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bot.exe
    .exe windows:5 windows x86 arch:x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections