Dcrat.7z Page

: Attackers can extract browser credentials, stored passwords, and session cookies.

: The malware can be configured to restart with the system and employs various anti-analysis techniques to hide from antivirus software. DcRat.7z

Files named DcRat.7z found on personal devices or corporate networks are high-risk indicators of a compromise. Security teams use configuration extractors and threat identifiers to detect its presence and block its communication with Command and Control (C2) servers. Releases · qwqdanchun/DcRat - GitHub : Attackers can extract browser credentials

: It includes a built-in file manager to upload, delete, rename, and even archive files using 7z compression directly on the victim's machine. DcRat.7z

Close