Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 30, 2025, 1:09 p.m. | April 30, 2025, 1:10 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
199.230.105.25 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | EaseOfAccessDialog.pdb |
section | .didat |
resource name | MUI |
host | 199.230.105.25 |
Bkav | W32.AIDetectMalware |
Skyhigh | BehavesLike.Win32.Dropper.hh |
Sangfor | Trojan.Win32.Agent.Vw02 |
CrowdStrike | win/malicious_confidence_60% (W) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
Avast | Win32:Lumma-E [Drp] |
Rising | Trojan.Agent/JS!8.11351 (CLOUD) |
McAfeeD | ti!9FA12E8D0E31 |
Sophos | Troj/DwnLd-ARJ |
Detected | |
Microsoft | Trojan:Win32/LummaStealer!rfn |
ZoneAlarm | Troj/DwnLd-ARJ |
McAfee | Artemis!21FB1CC18A4C |
DeepInstinct | MALICIOUS |
Ikarus | Dropper.Lumma |
AVG | Win32:Lumma-E [Drp] |
Paloalto | generic.ml |