General

  • Target

    1984-64-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    b0bbecf18c2fb946862128173b190910

  • SHA1

    8c77a1fd667f4089754e7e5609f60307170f28b1

  • SHA256

    5f9677a35f6d50f16b7fceeaa605aa8740b4cfb7c7ac1b394f1b278445a1f8f1

  • SHA512

    c846b3d69c5aec5bee2f8f58c63422d6e2c31ffe2dec37f1972243d656b1f289f5ad817e5bfea1f3067b67e881c8cafa8913d3321e6eb210ead8ed81a6a5e66b

  • SSDEEP

    1536:HNhlUsX6kD8w22laSR0V+3CJrVdXHSzJlK4:tHUCv8ilVR++3CVVdKJl

Score
10/10

Malware Config

Signatures

  • Ramnit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1984-64-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe .vbs windows x86