General

  • Target

    1904-12-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    9dda6f3cfe01dff61e246d909750941f

  • SHA1

    5e073065984a4e3213a3f822c106b26d35f0437e

  • SHA256

    78fbb3493d29e7911b8dc9699606e6a39e73cbb01c2d412d3a5579743b15ab02

  • SHA512

    9b99b6f415e4e33052cf9587d794816f1375dedeea43fb4650a15e2b3c501c8554f40221699b783596417769253639c9e2ab060676492d8776168dd93b2652ae

  • SSDEEP

    1536:HNhlUsX6hD8w22laSR0V+3CJrVdXHSzJlY4:tHUCG8ilVR++3CVVdKJl

Score
10/10

Malware Config

Signatures

  • Ramnit family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 1904-12-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe .vbs windows x86