Summary | ZeroBOX

oo

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 31, 2024, 10:16 a.m. July 31, 2024, 10:17 a.m.
Size 158.1KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ea252af032b9cb8339089c3a8369e6b3
SHA256 ef4ce0ac77d632d53b19aba78cd2175da2faae629cec69e1adbc1e550a5ae873
CRC32 E1FE5F4D
ssdeep 3072:u88nbom5iYK288nbom5iYKT88nbom5iYKQ88nbom5iYK:fyihHyihyyihlyih
PDB Path dialer.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path dialer.pdb
resource name MUI
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Lumma.4!c
Cynet Malicious (score: 99)
Skyhigh Artemis!Trojan
ALYac Gen:Variant.Mikey.168486
Cylance Unsafe
VIPRE Gen:Variant.Mikey.168486
Sangfor Trojan.JS.Agent.Vxfx
K7AntiVirus Trojan ( 005b37251 )
BitDefender Gen:Variant.Mikey.168486
K7GW Trojan ( 005b37251 )
Cybereason malicious.032b9c
Arcabit Trojan.Mikey.D29226
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of JS/Agent.RNX
McAfee Artemis!EA252AF032B9
Avast Win32:Lumma-E [Drp]
Alibaba Trojan:JS/Lumma.47185d80
MicroWorld-eScan Gen:Variant.Mikey.168486
Rising Trojan.Agent/JS!8.11351 (CLOUD)
Emsisoft Gen:Variant.Mikey.168486 (B)
F-Secure Malware.JS/Agent.xgajz
Zillya Trojan.Agent.JS.7611
TrendMicro TrojanSpy.Win32.LUMMASTEALER.YXEG5Z
McAfeeD ti!EF4CE0AC77D6
FireEye Gen:Variant.Mikey.168486
Sophos Mal/Generic-S
Google Detected
Avira JS/Agent.xgajz
MAX malware (ai score=88)
Microsoft Trojan:Win32/Casdet!rfn
GData Gen:Variant.Mikey.168486
DeepInstinct MALICIOUS
Ikarus Trojan.JS.Agent
Panda Trj/Chgt.AD
Tencent Malware.Win32.Gencirc.14136c89
Fortinet W32/Agent.DAT!tr
AVG Win32:Lumma-E [Drp]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_60% (W)
alibabacloud Trojan:Javascript/Mikey.Gen