Summary | ZeroBOX

releaseform

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 31, 2024, 10:16 a.m. July 31, 2024, 10:16 a.m.
Size 184.5KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 db1ae063d1be2bcb6af8f4afb145cdc4
SHA256 1f194878aa557011e83bd5c1c6fab11956322688a35ef0fbd0bb876fa667c5f5
CRC32 8AAE97F6
ssdeep 768:S0WfYij5T3By/zDO580WfYij5T3By/zDO5aA9zJ0WfYij5T3By/zDO5+P0WfYijx:S0AC/O580AC/O5aMzJ0AC/O5K0AC/O5
PDB Path BthUdTask.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path BthUdTask.pdb
section .didat
resource name MUI
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Lumma.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
Skyhigh Artemis!Trojan
McAfee Artemis!DB1AE063D1BE
Sangfor Trojan.Win32.Agent.Vchg
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of JS/Agent.RNX
Avast Win32:Lumma-E [Drp]
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Trojan:JS/Lumma.36daf95e
Rising Trojan.Agent/JS!8.11351 (CLOUD)
F-Secure Malware.JS/Agent.mshgh
TrendMicro TrojanSpy.Win32.LUMMASTEALER.YXEG5Z
McAfeeD ti!1F194878AA55
Google Detected
Avira JS/Agent.mshgh
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Trojan.Win32.Downloader.oa!s1
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm UDS:DangerousObject.Multi.Generic
DeepInstinct MALICIOUS
Malwarebytes Trojan.Downloader
Ikarus Trojan.JS.Agent
TrendMicro-HouseCall TrojanSpy.Win32.LUMMASTEALER.YXEG5Z
Fortinet JS/Agent.RNX!tr
AVG Win32:Lumma-E [Drp]
alibabacloud Trojan:Javascript/Agent.RTF