Summary | ZeroBOX

newbild.exe

PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 June 16, 2024, 10:01 a.m. June 16, 2024, 10:04 a.m.
Size 2.4MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f9fc06f0cc64b6a700eda6fd6d816df3
SHA256 590ebd6f2bb5735659f13faa2fa92c8520918affd39f9878a6bf648f05e0e8f5
CRC32 2B02559C
ssdeep 49152:x9MTyxpl09Ltg3yLzZvLSyGc4jRk1Mh44DfN0BNuQzWoLBs6LBe8hB:xmTyH2VtNLFDLG/RfhmByoLBBLPf
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

section .vmp@\xc2\xb2\xe2
resource name REGISTRY
section {u'size_of_data': u'0x00267600', u'virtual_address': u'0x00150000', u'entropy': 7.952601989118083, u'name': u'.vmp@\\xc2\\xb2\\xe2', u'virtual_size': u'0x002674a0'} entropy 7.95260198912 description A section with a high entropy has been found
entropy 0.995953874165 description Overall entropy of this PE file is high
section .vmp@\xc2\xb2\xe2 description Section name indicates VMProtect
section .vmp@\xc2\xb2\xe2 description Section name indicates VMProtect
section .vmp@\xc2\xb2\xe2 description Section name indicates VMProtect
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.LummaStealer.4!c
Cynet Malicious (score: 99)
ALYac Trojan.GenericKD.73075858
Cylance Unsafe
VIPRE Trojan.GenericKD.73075858
Sangfor Spyware.Win32.Lummastealer.V97b
K7AntiVirus Spyware ( 005b6a051 )
K7GW Spyware ( 005b6a051 )
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Spy.LummaStealer.B
APEX Malicious
Paloalto generic.ml
Alibaba TrojanSpy:Win32/LummaStealer.2f3cd45d
MicroWorld-eScan Trojan.GenericKD.73075858
Rising Trojan.Generic@AI.100 (RDML:iYt8LVUudJmCkT5ZogxC1g)
Emsisoft Trojan.GenericKD.73075858 (B)
F-Secure Trojan.TR/AVI.Agent.pablh
TrendMicro Trojan.Win32.AMADEY.YXEFHZ
McAfeeD Real Protect-LS!F9FC06F0CC64
Trapmine malicious.high.ml.score
Sophos Generic Reputation PUA (PUA)
Ikarus Trojan-Spy.Win32.LummaStealer
Avira TR/AVI.Agent.pablh
MAX malware (ai score=85)
Antiy-AVL Trojan[Spy]/Win32.LummaStealer
Kingsoft Win32.HeurC.KVMH008.a
Gridinsoft Spy.Win32.Gen.tr
Xcitium Malware@#22o2cjzpmkd2q
Arcabit Trojan.Generic.D45B0C92
Varist W32/ABSpyware.SGBR-3873
AhnLab-V3 Trojan/Win.Generic.C5641283
BitDefenderTheta Gen:NN.ZexaF.36806.AI0@aO7w4Mci
Malwarebytes Spyware.Lumma
TrendMicro-HouseCall Trojan.Win32.AMADEY.YXEFHZ
SentinelOne Static AI - Malicious PE
MaxSecure Win.MxResIcn.Heur.Gen
Fortinet W32/LummaStealer.B!tr.spy
Panda Trj/Chgt.AD
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud Trojan:Win/LummaStealer.B