Summary | ZeroBOX

pussy.html

Gen1 Generic Malware Malicious Library UPX Malicious Packer PE File PE32
Category Machine Started Completed
FILE s1_win7_x6401 April 30, 2025, 1:05 p.m. April 30, 2025, 1:07 p.m.
Size 554.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1c8e5ffccf0b17edd12c67e4bda1a876
SHA256 8ae4be75ecf05d541ff0bebafa27963253e4f554f819754869bd26933c2f8941
CRC32 8467ED14
ssdeep 6144:/GUskdKGfkGauwVzGUskdKGfkGauwVSGUskdKGfkGauwVvGUskdKGfkGauwVEGUK:/SoJlQSoJl7SoJlySoJlhSoJl
PDB Path EaseOfAccessDialog.pdb
Yara
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Malicious_Packer_Zero - Malicious Packer
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

pdb_path EaseOfAccessDialog.pdb
section .didat
resource name MUI
Bkav W32.AIDetectMalware
Skyhigh BehavesLike.Win32.Dropper.hh
Sangfor Trojan.Win32.Agent.V8k0
CrowdStrike win/malicious_confidence_60% (W)
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
Avast Win32:Lumma-E [Drp]
Rising Trojan.Agent/JS!8.11351 (CLOUD)
McAfeeD ti!8AE4BE75ECF0
Sophos Troj/DwnLd-ARJ
Google Detected
Microsoft Trojan:Win32/LummaStealer!rfn
ZoneAlarm Troj/DwnLd-ARJ
McAfee Artemis!1C8E5FFCCF0B
DeepInstinct MALICIOUS
Ikarus Dropper.Lumma
AVG Win32:Lumma-E [Drp]
Paloalto generic.ml