General

  • Target

    dd.zip

  • Size

    5.5MB

  • MD5

    b3423aa20d59bb02c34ec98c4e272033

  • SHA1

    c57bc56f73ebbd993140dfb0ac6e38d65291a337

  • SHA256

    fac22aa9675ed6bd14f0f61cf80ef18802bebed29751249a851830941e9632e5

  • SHA512

    04a27d65c90d16a22d9a338e7c65460cd848d7cc1cd96a7b1e3215cd7b4dd6e608359db7a996ea99fb00937da13891f5bba295189a43670dabc4cd64b63a76e9

  • SSDEEP

    98304:Q3gGq8WMTs5n2dXZ19u/NPxtMu+7fnrywMhvZ35SkjJlTifJAw3KZ5Vf9BzyocOu:Q3gIWMTs52dXLwFJtM57frywMhqkjgDD

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • dd.zip
    .zip
  • dd/ProcessHollowing.exe
    .exe windows x64

    cc6060b394c3d24d0aa9c3ee3d0e3656


    Headers

    Imports

    Exports

    Sections

  • dd/Yd14BzxuNkmfmpFg.exe
    .exe windows x64


    Headers

    Sections