General
-
Target
4952-164-0x0000000004DD0000-0x0000000004EEB000-memory.dmp
-
Size
1.1MB
-
MD5
22d16f8a06b42e8ab35cfdb838abf367
-
SHA1
c466d9c86b7e1752e873828f521f48012bffafaa
-
SHA256
89dadec6f63b992d9176054d12e86851750ed994b2d303a351c18e548b67b65a
-
SHA512
c5ef3cb7025969d6fa5cee9f8d73a432bb9cc23e8ded069df33df3dfc5891ba5301956b51e3fae34619a4c9731e308e947abfb0ee55ea9cc1b39ee25d6502c4f
-
SSDEEP
24576:7BUIKn/vwOXGUXAjCymYZiVtElVIBT2roqnTSSxWeT/dRPOO8mWQHUq7:f0dwAYZt6C31WeTVRPOhm7Uq7
Score
10/10
Malware Config
Signatures
-
Detected Djvu ransomware 1 IoCs
resource yara_rule sample family_djvu -
Djvu family
Files
-
4952-164-0x0000000004DD0000-0x0000000004EEB000-memory.dmp