Summary | ZeroBOX

vuex.exe

Generic Malware Malicious Library UPX Malicious Packer PE64 PE File dll OS Processor Check DllRegisterServer
Category Machine Started Completed
FILE s1_win7_x6401 Sept. 26, 2024, 12:05 p.m. Sept. 26, 2024, 12:08 p.m.
Size 6.6MB
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 63af41d74c38b6c1b1a5f08ff328ed1f
SHA256 a320d925690b7190c2f2a1ae27edc0d480a4dcab424057e184dfdc167e16f176
CRC32 AFE6AD3A
ssdeep 49152:I5Rf3U84BJR11+xfDMiUy7Okr4MkJM9DvnPyXRmv0rNQXs5VKcWjO5EWIjAl97jB:IQv1Q21wnPyXR2x2fE2f58DSo8
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • DllRegisterServer_Zero - execute regsvr32.exe
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Bkav W64.AIDetectMalware
Cynet Malicious (score: 99)
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of WinGo/TrojanDropper.Agent.ES
Avast Win64:Evo-gen [Trj]
Alibaba TrojanDropper:Win32/LummaStealer.2e5f6eb6
Rising Trojan.Agent!1.F9CC (CLASSIC)
F-Secure Heuristic.HEUR/AGEN.1375488
McAfeeD ti!A320D925690B
Sophos Generic Reputation PUA (PUA)
SentinelOne Static AI - Suspicious PE
Google Detected
Avira HEUR/AGEN.1375488
Antiy-AVL Trojan[Dropper]/Win32.Agent
Microsoft Trojan:Win32/Caynamer.A!ml
GData Win64.Trojan.Agent.2R58LB
Varist W64/Agent.IKW.gen!Eldorado
McAfee Artemis!63AF41D74C38
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.4218531598
Ikarus Trojan-Spy.LummaStealer
Tencent Win32.Trojan.Agen.Fflw
huorong HEUR:TrojanDropper/Agent.up
Fortinet W32/Agent.ES!tr
AVG Win64:Evo-gen [Trj]
Paloalto generic.ml
alibabacloud Trojan[dropper]:Multi/Wacapew.C9nj