Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 2025-Jan-10 14:36:40 |
Comments | oversee generate venture progress perceive conceive comprehend lazy bright train.exe |
FileDescription | it lazy white.exe |
FileVersion | 8.8.0.3 |
InternalName | XeniaZacharyGrace.lnktYuL |
LegalCopyright | plan dark sprint revolutionize motivate (c) 2023 |
OriginalFilename | XeniaZacharyGrace.lnktYuL |
ProductVersion | 8.8.0.3 |
Assembly Version | 8.8.0.3 |
Info | Matching compiler(s): |
Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft |
Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains another PE executable:
|
Info | Cryptographic algorithms detected in the binary: |
Uses constants related to CRC32
Uses known Mersenne Twister constants |
Malicious | VirusTotal score: 31/72 (Scanned on 2025-01-11 05:00:22) |
ALYac:
Gen:Variant.Jalapeno.19250
APEX: Malicious AVG: Win32:PWSX-gen [Trj] Arcabit: Trojan.Jalapeno.D4B32 Avast: Win32:PWSX-gen [Trj] BitDefender: Gen:Variant.Jalapeno.19250 CTX: exe.unknown.jalapeno CrowdStrike: win/malicious_confidence_90% (D) Cylance: Unsafe DeepInstinct: MALICIOUS ESET-NOD32: a variant of MSIL/TrojanDropper.Agent.GCY Elastic: Windows.Trojan.Lumma Emsisoft: Gen:Variant.Jalapeno.19250 (B) FireEye: Generic.mg.609ad3d99e5148f5 Fortinet: MSIL/Agent.GCY!tr GData: Gen:Variant.Jalapeno.19250 Google: Detected Ikarus: Trojan-Spy.Win32.LummaStealer Kaspersky: HEUR:Trojan.MSIL.Injuke.gen Malwarebytes: Malware.AI.2246851199 McAfeeD: Real Protect-LS!609AD3D99E51 MicroWorld-eScan: Gen:Variant.Jalapeno.19250 Microsoft: Trojan:MSIL/LummaC.ACIA!MTB Panda: Trj/GdSda.A SentinelOne: Static AI - Malicious PE Symantec: ML.Attribute.HighConfidence Tencent: OB:Trojan.Msil.Kryptik.16001593 Trapmine: malicious.moderate.ml.score VBA32: BScope.TrojanPSW.Lumma VIPRE: Gen:Variant.Jalapeno.19250 huorong: HEUR:TrojanSpy/LummaStealer.f |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x80 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 3 |
TimeDateStamp | 2025-Jan-10 14:36:40 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
|
Magic | PE32 |
---|---|
LinkerVersion | 48.0 |
SizeOfCode | 0x77200 |
SizeOfInitializedData | 0xa00 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x0007904E (Section: .text) |
BaseOfCode | 0x2000 |
BaseOfData | 0x7a000 |
ImageBase | 0x400000 |
SectionAlignment | 0x2000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x7e000 |
SizeOfHeaders | 0x200 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
mscoree.dll |
_CorExeMain
|
---|
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 8.8.0.3 |
ProductVersion | 8.8.0.3 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
FileType |
VFT_APP
|
Language | UNKNOWN |
Comments | oversee generate venture progress perceive conceive comprehend lazy bright train.exe |
FileDescription | it lazy white.exe |
FileVersion (#2) | 8.8.0.3 |
InternalName | XeniaZacharyGrace.lnktYuL |
LegalCopyright | plan dark sprint revolutionize motivate (c) 2023 |
OriginalFilename | XeniaZacharyGrace.lnktYuL |
ProductVersion (#2) | 8.8.0.3 |
Assembly Version | 8.8.0.3 |
Resource LangID | UNKNOWN |
---|