Summary | ZeroBOX

Presentation

UPX PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6403_us April 13, 2025, 3:17 p.m. April 13, 2025, 3:17 p.m.
Size 114.5KB
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 060068e1f94bbf90ea34a85523efb355
SHA256 3dca1ca4131535a30d10ed6c8ceb737860f7d34caf86a54ce08aa4161f8a9efd
CRC32 B734C753
ssdeep 384:wCFGSjBEkWUcWpCFGSjBEkWUcWECFGSjBEkWUcWAPUvQYHfHnPvcDXHDOp87WdqD:ZJECiJECnJECTJEC1qJEC
PDB Path help.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path help.pdb
resource name MUI
Cylance Unsafe
Sangfor Trojan.Win32.Agent.Vrqp
CrowdStrike win/malicious_confidence_60% (D)
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
Avast Win32:Lumma-E [Drp]
Kaspersky HEUR:Trojan.Script.Generic
Alibaba Trojan:Script/Lumma.8cdf307a
Rising Trojan.Generic!8.C3 (CLOUD)
McAfeeD ti!3DCA1CA41315
Sophos Troj/DwnLd-ARJ
Google Detected
Microsoft Trojan:Win32/LummaStealer!rfn
ZoneAlarm Troj/DwnLd-ARJ
McAfee Artemis!060068E1F94B
DeepInstinct MALICIOUS
Ikarus Win32.Outbreak
Fortinet W32/Agent.PWSL!tr
AVG Win32:Lumma-E [Drp]