Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 4, 2025, 12:42 p.m. | May 4, 2025, 12:44 p.m. |
-
44eed8d4-5207-493c-85f8-25e64148dc0c.exe "C:\Users\test22\AppData\Local\Temp\44eed8d4-5207-493c-85f8-25e64148dc0c.exe"
2544
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .B6 |
section | .gxfg |
section | .retplne |
section | _RDATA |
section | .jss |
section | {u'size_of_data': u'0x000e1c00', u'virtual_address': u'0x00001000', u'entropy': 7.046736905221551, u'name': u'.text', u'virtual_size': u'0x000e1b6e'} | entropy | 7.04673690522 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00002800', u'virtual_address': u'0x000fe000', u'entropy': 6.937011670509002, u'name': u'.B6', u'virtual_size': u'0x000026cd'} | entropy | 6.93701167051 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00056c00', u'virtual_address': u'0x00107000', u'entropy': 7.9994039718823995, u'name': u'.jss', u'virtual_size': u'0x00056c00'} | entropy | 7.99940397188 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00056c00', u'virtual_address': u'0x0015e000', u'entropy': 7.9994039718823995, u'name': u'.jss', u'virtual_size': u'0x00056c00'} | entropy | 7.99940397188 | description | A section with a high entropy has been found | |||||||||
entropy | 0.939216832262 | description | Overall entropy of this PE file is high |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Krypt.i!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Ghanarava.174626596907d77d |
Skyhigh | BehavesLike.Win64.Suspect.tc |
ALYac | Gen:Variant.Lazy.676353 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Lazy.676353 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Lazy.676353 |
K7GW | Trojan ( 005c5b011 ) |
K7AntiVirus | Trojan ( 005c5b011 ) |
Arcabit | Trojan.Lazy.DA5201 |
VirIT | Trojan.Win32.GenusT.EVVK |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/Kryptik.FAZ |
APEX | Malicious |
Avast | Win64:MalwareX-gen [Cryp] |
Kaspersky | Trojan-PSW.Win32.Lumma.kit |
Alibaba | Trojan:Win64/GenKryptik.6d69fb39 |
MicroWorld-eScan | Gen:Variant.Lazy.676353 |
Rising | Trojan.LummaStealer!8.17CC6 (TFE:1:wtFsuAm2TiB) |
Emsisoft | Gen:Variant.Lazy.676353 (B) |
F-Secure | Trojan.TR/Crypt.Agent.dculb |
Zillya | Trojan.GenKryptik.Win64.50159 |
TrendMicro | Trojan.Win64.AMADEY.YXFDOZ |
McAfeeD | ti!E9B837CD0778 |
CTX | exe.trojan.generic |
Sophos | Troj/Krypt-AQA |
Jiangmin | Trojan.PSW.Lumma.jd |
Detected | |
Avira | TR/Crypt.Agent.dculb |
Antiy-AVL | GrayWare/Win32.Wacapew |
Kingsoft | malware.kb.a.728 |
Xcitium | Malware@#26lpr2uv81g44 |
Microsoft | Trojan:Win64/LummaC.NFI!MTB |
ZoneAlarm | Troj/Krypt-AQA |
GData | Gen:Variant.Lazy.676353 |
Varist | W64/ABTrojan.BHBH-1349 |
AhnLab-V3 | Trojan/Win.Generic.R700376 |
McAfee | Artemis!54E012B7BF09 |
DeepInstinct | MALICIOUS |
VBA32 | TrojanPSW.Lumma |
Malwarebytes | Trojan.MalPack.PES.Generic |
Ikarus | Trojan.Win64.Krypt |
Panda | Trj/GdSda.A |
TrendMicro-HouseCall | Trojan.Win32.VSX.PE04C9Z |
Tencent | Malware.Win32.Gencirc.10c37b09 |