Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | May 4, 2025, 12:41 p.m. | May 4, 2025, 1:01 p.m. |
-
83a1472d-9e7e-47bd-b9d3-89a476993925.exe "C:\Users\test22\AppData\Local\Temp\83a1472d-9e7e-47bd-b9d3-89a476993925.exe"
292
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .B1 |
section | .gxfg |
section | .retplne |
section | _RDATA |
section | .jss |
section | {u'size_of_data': u'0x0006b400', u'virtual_address': u'0x00001000', u'entropy': 7.042940306059062, u'name': u'.text', u'virtual_size': u'0x0006b3e0'} | entropy | 7.04294030606 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00003200', u'virtual_address': u'0x00083000', u'entropy': 6.928241024350845, u'name': u'.B1', u'virtual_size': u'0x00003189'} | entropy | 6.92824102435 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00055e00', u'virtual_address': u'0x0008d000', u'entropy': 7.999488294352259, u'name': u'.jss', u'virtual_size': u'0x00055e00'} | entropy | 7.99948829435 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00055e00', u'virtual_address': u'0x000e3000', u'entropy': 7.999488294352259, u'name': u'.jss', u'virtual_size': u'0x00055e00'} | entropy | 7.99948829435 | description | A section with a high entropy has been found | |||||||||
entropy | 0.933030177759 | description | Overall entropy of this PE file is high |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Lumma.1u!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Ghanarava.1746265601702b0c |
Skyhigh | BehavesLike.Win64.VirusWinExpiro.tc |
ALYac | Gen:Variant.Lazy.676353 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Lazy.676353 |
Sangfor | Infostealer.Win64.Kryptik.Vntu |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Lazy.676353 |
K7GW | Trojan ( 005c57741 ) |
K7AntiVirus | Trojan ( 005c57741 ) |
Arcabit | Trojan.Lazy.DA5201 |
VirIT | Trojan.Win32.GenusT.EVCL |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/Kryptik.FAZ |
APEX | Malicious |
Avast | Win64:MalwareX-gen [Misc] |
Kaspersky | Trojan-PSW.Win32.Lumma.jvo |
NANO-Antivirus | Trojan.Win64.Lumma.kwrzjb |
MicroWorld-eScan | Gen:Variant.Lazy.676353 |
Rising | Stealer.Agent!8.C2 (CLOUD) |
Emsisoft | Gen:Variant.Lazy.676353 (B) |
F-Secure | Trojan.TR/Crypt.Agent.wbxqu |
DrWeb | Trojan.PWS.DarkCloud.15 |
Zillya | Trojan.DarkCloud.Win32.259 |
TrendMicro | TrojanSpy.Win64.LUMMASTEALER.YXFDKZ |
McAfeeD | ti!1410C8ACF33C |
CTX | exe.trojan.lumma |
Sophos | Troj/Krypt-AQA |
Jiangmin | Trojan.PSW.MSIL.eyhy |
Webroot | Win.Infostealer.Lumma |
Detected | |
Avira | TR/Crypt.Agent.wbxqu |
Antiy-AVL | Trojan/Win32.Sonbokli |
Kingsoft | malware.kb.a.985 |
Gridinsoft | Trojan.Win64.Kryptik.sa |
Xcitium | Malware@#3745u8krq3jrs |
Microsoft | Trojan:Win64/LummaC.GTB!MTB |
ZoneAlarm | Troj/Krypt-AQA |
GData | Gen:Variant.Lazy.676353 |
Varist | W64/Agent.NGBH |
AhnLab-V3 | Trojan/Win.GenKryptik.R699960 |
McAfee | Artemis!D7F0C89F533B |
DeepInstinct | MALICIOUS |
VBA32 | TrojanPSW.Lumma |
Malwarebytes | Crypt.Trojan.MSIL.DDS |
Ikarus | Trojan.Win64.Krypt |