General

  • Target

    Telegram.exe

  • Size

    1.5MB

  • MD5

    cbc1250f5968b3aad9f7b917ab0cb3fa

  • SHA1

    57b64deea04bc339894d77725703c4d0b239f47e

  • SHA256

    65b40c1d42b7b6248defa42191a2ac60c239f8f72889a6544e7427ab3c7c0587

  • SHA512

    cf5eabff6cdcff3a314d3e884028ad908ab866934af520623e97f7ed9b58834e7c34f3b371288461c627eb7921e8e94a29e0390151134efd46263d3fb3b3cc93

  • SSDEEP

    24576:U2G/nvxW3Ww0twsabRr96PUyifNzW657ZcGUOXTjieEVFpZ9867SgxeU1nS9x8Ay:UbA30+R0U5xgOFsbP7Bxe0S74yw

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Telegram.exe
    .exe windows:5 windows x86 arch:x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections