Summary | ZeroBOX

linkedin.exe

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us July 25, 2024, 3:31 p.m. July 25, 2024, 3:33 p.m.
Size 306.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1a99f8243d4971ae826fc063142c5b0b
SHA256 20c2ec15c6c8a4e10701b95e152d5e14cd98a69c4a82eb12252077dde26c7eda
CRC32 233208EE
ssdeep 6144:VlbxNgDQN3KQ77vqCrbRmPv9wZcCZeDFs3Esj1XZzr8A7QPWHKilooogkSKX:zgcN3KQ77vqCrbHZcHUEskAYWqilooo0
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Bkav W32.AIDetectMalware
Elastic Windows.Trojan.Lumma
Cynet Malicious (score: 100)
Skyhigh BehavesLike.Win32.VirRansom.fh
ALYac Gen:Variant.Lazy.449542
Cylance Unsafe
VIPRE Gen:Variant.Lazy.449542
BitDefender Gen:Variant.Lazy.449542
Cybereason malicious.43d497
Arcabit Trojan.Lazy.D6DC06
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/Spy.LummaStealer.B
APEX Malicious
McAfee Artemis!1A99F8243D49
Avast Win32:Evo-gen [Trj]
ClamAV Win.Packed.Lazy-10033561-0
NANO-Antivirus Virus.Win32.Gen.ccmw
MicroWorld-eScan Gen:Variant.Lazy.449542
Rising Spyware.LummaStealer!8.1A464 (TFE:5:YglkxfxvbwO)
Emsisoft Gen:Variant.Lazy.449542 (B)
F-Secure Trojan.TR/Crypt.XPACK.Gen
McAfeeD Real Protect-LS!1A99F8243D49
Trapmine malicious.high.ml.score
FireEye Generic.mg.1a99f8243d4971ae
Ikarus Trojan-Spy.Win32.LummaStealer
Google Detected
Avira TR/Crypt.XPACK.Gen
MAX malware (ai score=82)
Antiy-AVL Trojan[Spy]/Win32.LummaStealer
Kingsoft malware.kb.a.987
Microsoft Trojan:Win32/Wacatac.B!ml
GData Gen:Variant.Lazy.449542
AhnLab-V3 Trojan/Win.Generic.R657991
BitDefenderTheta AI:Packer.FB12E6D31E
Malwarebytes Spyware.Lumma
Tencent Trojan-PSW.Win32.Convagent.he
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/LummaStealer.B!tr.spy
AVG Win32:Evo-gen [Trj]
CrowdStrike win/malicious_confidence_60% (D)