MalwareBazaar Database

This page shows some basic information the YARA rule PK_PUMP_AND_DUMP including corresponding malware samples.

Database Entry


YARA Rule:PK_PUMP_AND_DUMP
Author:Will Metcalf @node5
Description:Walks Zip Central Directory filename entries looking for abused extension then checks for a file that's at least 25M and then check to see how much uncompressed size is vs compressed size
Firstseen:2023-03-09 19:56:37 UTC
Lastseen:2025-11-12 20:51:44 UTC
Sightings:332

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter