Summary | ZeroBOX

Lumm.exe

Emotet PhysicalDrive Generic Malware Malicious Library UPX Anti_VM MSOffice File PE File PE32
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 24, 2024, 7:15 p.m. Nov. 24, 2024, 7:19 p.m.
Size 6.2MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 11c8962675b6d535c018a63be0821e4c
SHA256 421e36788bfcb4433178c657d49aa711446b3a783f7697a4d7d402a503c1f273
CRC32 8291A511
ssdeep 98304:u4bRxuHuFP2rHLpHPA477yNRgoPbfnRROWR721LYfs17u0kcFrXLEJfwY:u4NxuOFI1AEyrbf/52BYfs1LkcFrXL+X
PDB Path E:\PassNow\MagicRescueCD\CD_Win_Burner\Release\RescueCDBurner.pdb
Yara
  • PhysicalDrive_20181001 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Emotet_2_Zero - Win32 Trojan Emotet
  • Microsoft_Office_File_Zero - Microsoft Office File
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path E:\PassNow\MagicRescueCD\CD_Win_Burner\Release\RescueCDBurner.pdb
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00620260 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00620260 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00620260 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00620260 size 0x00000468
name RT_ICON language LANG_CHINESE filetype GLS_BINARY_LSB_FIRST sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00620260 size 0x00000468
name RT_GROUP_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x006206c8 size 0x0000004c
name RT_VERSION language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x00620718 size 0x0000031c
VBA32 BScope.Trojan.AceDeciever
section {u'size_of_data': u'0x0057ee00', u'virtual_address': u'0x00084000', u'entropy': 7.611710940878462, u'name': u'.rdata', u'virtual_size': u'0x0057edc8'} entropy 7.61171094088 description A section with a high entropy has been found
entropy 0.889512368608 description Overall entropy of this PE file is high