General

  • Target

    9cf6cd197d923c4806912e9c5ef08e3c2c50fb4b20d4ab8b15590a88b73f296b

  • Size

    432KB

  • MD5

    960be0635fcbe74da71408b7d052e01a

  • SHA1

    be02f439acb5cd41560a75c86a9a54777ee04543

  • SHA256

    9cf6cd197d923c4806912e9c5ef08e3c2c50fb4b20d4ab8b15590a88b73f296b

  • SHA512

    ae900d35fe2cc30299f9b8b5625470504563bd2b4e21df4637266744b24f80ae5ae932573d138e7ef1fa95376533227a853690eb2af37b8f69b21236bf67a28f

  • SSDEEP

    6144:+Dcd3kwnUTIGXgyimt41oxHPzfW9k+T97ztuyWYZ8TS:+Dcd3kNTxgstcoNbik+T97z0Fa8O

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 9cf6cd197d923c4806912e9c5ef08e3c2c50fb4b20d4ab8b15590a88b73f296b
    .zip
  • {VKK+KODS}/Vkk.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • {VKK+KODS}/vkk.exe
    .exe windows:5 windows x86 arch:x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections