Summary | ZeroBOX

active2

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 5, 2024, 10:33 a.m. Aug. 5, 2024, 10:33 a.m.
Size 161.8KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 94a367aad29847380f2bdf52a90197aa
SHA256 7d5feb91de3bdff55a69dd855aa722bd0756e0007af74fb8b7fb777357730707
CRC32 5A359D29
ssdeep 3072:088nbom5xIAb88nbom5xIAOACbojBhJ48fRRO5UcJTK0jLb/BoK4ZwKi4x+sXN90:ByxH6yxHjyxH+yxH
PDB Path dialer.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path dialer.pdb
resource name MUI
Bkav W32.AIDetectMalware
Elastic malicious (moderate confidence)
ALYac Gen:Variant.Mikey.169029
VIPRE Gen:Variant.Mikey.169029
BitDefender Gen:Variant.Mikey.169029
Cybereason malicious.ad2984
Arcabit Trojan.Fugrafa.D4D8A8
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of JS/Agent.RNX
Avast Win32:Lumma-E [Drp]
MicroWorld-eScan Gen:Variant.Mikey.169029
Emsisoft Gen:Variant.Mikey.169029 (B)
FireEye Gen:Variant.Mikey.169029
Ikarus Trojan.JS.Agent
Google Detected
Microsoft Program:Win32/Wacapew.C!ml
GData Gen:Variant.Mikey.169029
MAX malware (ai score=87)
Fortinet W32/Agent.DAT!tr
AVG Win32:Lumma-E [Drp]