Summary | ZeroBOX

ghgadadas.exe

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 Aug. 9, 2024, 4:33 p.m. Aug. 9, 2024, 4:33 p.m.
Size 167.3KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 eae8fea1fe3a77450002d315167b3471
SHA256 656099d4fcb2a5824b4bf2ac8d6356f33d73d9a2a4c401bcd986f7667ee71695
CRC32 99C447E4
ssdeep 3072:MXk7bSP2sXk7bSP2mXk7bSP2VXk7bSP2:0k7O+Uk7O+Kk7O+xk7O+
PDB Path dialer.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path dialer.pdb
resource name MUI
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Generic.4!c
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
ALYac Gen:Variant.Strictor.291211
VIPRE Gen:Variant.Strictor.291211
Sangfor Trojan.Win32.Agent.Vcbe
K7AntiVirus Trojan ( 005b37251 )
BitDefender Gen:Variant.Strictor.291211
K7GW Trojan ( 005b37251 )
Cybereason malicious.1fe3a7
Arcabit Trojan.Strictor.D4718B
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of JS/Agent.RNX
McAfee Artemis!EAE8FEA1FE3A
Avast Win32:Lumma-E [Drp]
Alibaba Trojan:JS/Lumma.7d9a7b34
MicroWorld-eScan Gen:Variant.Strictor.291211
Rising Trojan.Agent/JS!8.11351 (CLOUD)
Emsisoft Gen:Variant.Strictor.291211 (B)
F-Secure Malware.JS/Agent.wqqzt
McAfeeD ti!656099D4FCB2
FireEye Gen:Variant.Strictor.291211
Sophos Mal/Generic-S
Google Detected
Avira JS/Agent.wqqzt
MAX malware (ai score=81)
Gridinsoft Trojan.Win32.Agent.sa
Microsoft Trojan:Win32/Caynamer.A!ml
GData Gen:Variant.Strictor.291211
AhnLab-V3 Dropper/Win.Generic.C5656726
DeepInstinct MALICIOUS
Malwarebytes Trojan.JavaScript
Ikarus Trojan.JS.Agent
Tencent Js.Virus.Agent.Rgil
MaxSecure Trojan.Malware.273604416.susgen
Fortinet W32/Agent.DAT!tr
AVG Win32:Lumma-E [Drp]
Paloalto generic.ml
CrowdStrike win/malicious_confidence_60% (W)
alibabacloud Trojan:Javascript/Strictor.Gen