Summary | ZeroBOX

1d76a373-3471-4db1-81c3-f324140a6438

ZIP Format
Category Machine Started Completed
FILE s1_win7_x6401 May 6, 2025, 10:14 p.m. May 6, 2025, 10:16 p.m.
Size 4.8MB
Type Zip archive data, at least v2.0 to extract
MD5 9485f66c6036033821a2a9bf3415ea24
SHA256 259c109966432e15c723a87c848ea2f02297eccba9e26ffe6d2c4472a487e711
CRC32 B17D8E52
ssdeep 98304:dqYsUxnMSJm2z8aY8sIotHV8WkQipUkcUWs9dEXg06QnYA6EED9tf6uCH:cYr22HodH3tipUkciy7PTszyb
Yara
  • zip_file_format - ZIP file format

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

MicroWorld-eScan Trojan.GenericKD.76343719
VIPRE Trojan.GenericKD.76343719
BitDefender Trojan.GenericKD.76343719
Arcabit Trojan.Generic.D48CE9A7
ESET-NOD32 a variant of Win32/TrojanDownloader.Rugmi.ARZ
Rising Downloader.Rugmi!8.11816 (CLOUD)
Emsisoft Trojan.GenericKD.76343719 (B)
CTX zip.downloader.rugmi
Google Detected
Antiy-AVL Trojan[Downloader]/Win32.Rugmi
GData Win32.Trojan.Agent.II4AZL
Varist ABApplication.TYT
AhnLab-V3 Infostealer/Win.LummaC2.R703250
McAfee Artemis!7437857E56C2
VBA32 BScope.TrojanPSW.Lumma
Fortinet W32/Rugmi.ARZ!tr.dldr