Summary | ZeroBOX

medium.exe

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 31, 2024, 9:43 a.m. July 31, 2024, 9:43 a.m.
Size 166.4KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 581bca6d99edd1eb945af367af110a8c
SHA256 5a8ddb07e6ccdc7300ed2a70078139dc2a7792fbb36e85002939b83b4182bc53
CRC32 78AA980A
ssdeep 3072:u88nbom5iYK288nbom5iYK5z88nbom5iYK388nbom5iYK:fyihHyih5Syihuyih
PDB Path dialer.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path dialer.pdb
resource name MUI
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
ALYac Gen:Variant.Mikey.168486
VIPRE Gen:Variant.Mikey.168486
Sangfor Trojan.Win32.Agent.Vtz5
BitDefender Gen:Variant.Mikey.168486
Cybereason malicious.d99edd
Arcabit Trojan.Mikey.D29226
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of JS/Agent.RNX
McAfee Artemis!581BCA6D99ED
Avast Win32:Lumma-E [Drp]
Alibaba Trojan:JS/Lumma.d464de89
MicroWorld-eScan Gen:Variant.Mikey.168486
Rising Trojan.Agent/JS!8.11351 (CLOUD)
Emsisoft Gen:Variant.Mikey.168486 (B)
Zillya Trojan.Agent.JS.7611
McAfeeD ti!5A8DDB07E6CC
FireEye Gen:Variant.Mikey.168486
Google Detected
MAX malware (ai score=87)
Microsoft Trojan:Win32/Wacatac.B!ml
GData Gen:Variant.Mikey.168486
DeepInstinct MALICIOUS
Malwarebytes Generic.Malware/Suspicious
Ikarus Trojan.JS.Agent
Fortinet W32/Agent.DAT!tr
AVG Win32:Lumma-E [Drp]
CrowdStrike win/malicious_confidence_60% (W)
alibabacloud Trojan:Javascript/Mikey.Gen