Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | May 4, 2025, 12:43 p.m. | May 4, 2025, 12:46 p.m. |
-
cc6e2f6e-3b4d-46bf-94fb-99186ed3c3d0.exe "C:\Users\test22\AppData\Local\Temp\cc6e2f6e-3b4d-46bf-94fb-99186ed3c3d0.exe"
2580
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .B6 |
section | .gxfg |
section | .retplne |
section | _RDATA |
section | .jss |
section | {u'size_of_data': u'0x000e8c00', u'virtual_address': u'0x00001000', u'entropy': 7.047340550540461, u'name': u'.text', u'virtual_size': u'0x000e8b3e'} | entropy | 7.04734055054 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00002600', u'virtual_address': u'0x00105000', u'entropy': 6.9604320580166394, u'name': u'.B6', u'virtual_size': u'0x0000253a'} | entropy | 6.96043205802 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00056c00', u'virtual_address': u'0x0010e000', u'entropy': 7.99940163118378, u'name': u'.jss', u'virtual_size': u'0x00056c00'} | entropy | 7.99940163118 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00056c00', u'virtual_address': u'0x00165000', u'entropy': 7.99940163118378, u'name': u'.jss', u'virtual_size': u'0x00056c00'} | entropy | 7.99940163118 | description | A section with a high entropy has been found | |||||||||
entropy | 0.939907993099 | description | Overall entropy of this PE file is high |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Vidar.tsNL |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Trojan.Ghanarava.17462648023160f4 |
Skyhigh | BehavesLike.Win64.Suspect.tc |
ALYac | Gen:Variant.Lazy.676353 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Lazy.676353 |
Sangfor | Trojan.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Gen:Variant.Lazy.676353 |
K7GW | Trojan ( 005c593d1 ) |
K7AntiVirus | Trojan ( 005c593d1 ) |
Arcabit | Trojan.Lazy.DA5201 |
VirIT | Trojan.Win32.GenusT.EVRK |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win64/Kryptik.FAZ |
APEX | Malicious |
Avast | Win64:MalwareX-gen [Cryp] |
Kaspersky | Trojan-PSW.Win32.Lumma.kil |
Alibaba | Trojan:Win64/GenKryptik.b436b262 |
MicroWorld-eScan | Gen:Variant.Lazy.676353 |
Rising | Trojan.ShellCodeLoader!1.12B08 (CLASSIC) |
Emsisoft | Gen:Variant.Lazy.676353 (B) |
F-Secure | Trojan.TR/Crypt.Agent.ornoh |
DrWeb | Trojan.Packed2.49101 |
Zillya | Trojan.GenKryptik.Win64.49981 |
TrendMicro | Trojan.Win64.AMADEY.YXFDOZ |
McAfeeD | ti!756DA6493A9E |
CTX | exe.trojan.lumma |
Sophos | Troj/Krypt-AQA |
Jiangmin | Trojan.PSW.Lumma.hz |
Webroot | Win.Infostealer.Lumma |
Detected | |
Avira | TR/Crypt.Agent.ornoh |
Antiy-AVL | GrayWare/Win32.Wacapew |
Kingsoft | malware.kb.a.893 |
Xcitium | Malware@#1uu5d319j3fm4 |
Microsoft | Trojan:Win64/LummaC.NFI!MTB |
ZoneAlarm | Troj/Krypt-AQA |
GData | Gen:Variant.Lazy.676353 |
Varist | W64/ABTrojan.QAFI-6353 |
AhnLab-V3 | Trojan/Win.Generic.R700376 |
McAfee | Artemis!5C6A88863F1F |
DeepInstinct | MALICIOUS |
VBA32 | TrojanPSW.Lumma |
Malwarebytes | Trojan.MalPack.PES.Generic |
Ikarus | Trojan.Win64.Krypt |
Panda | Trj/GdSda.A |