Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 5, 2024, 10:33 a.m. | Aug. 5, 2024, 10:33 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | dialer.pdb |
resource name | MUI |
Bkav | W32.AIDetectMalware |
Elastic | malicious (moderate confidence) |
ALYac | Gen:Variant.Mikey.169029 |
VIPRE | Gen:Variant.Mikey.169029 |
BitDefender | Gen:Variant.Mikey.169029 |
Cybereason | malicious.ad2984 |
Arcabit | Trojan.Fugrafa.D4D8A8 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of JS/Agent.RNX |
Avast | Win32:Lumma-E [Drp] |
MicroWorld-eScan | Gen:Variant.Mikey.169029 |
Emsisoft | Gen:Variant.Mikey.169029 (B) |
FireEye | Gen:Variant.Mikey.169029 |
Ikarus | Trojan.JS.Agent |
Detected | |
Microsoft | Program:Win32/Wacapew.C!ml |
GData | Gen:Variant.Mikey.169029 |
MAX | malware (ai score=87) |
Fortinet | W32/Agent.DAT!tr |
AVG | Win32:Lumma-E [Drp] |