Dropped Files | ZeroBOX
Name cf11d6b3c18d4c02_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2976 (powershell.exe)
Type data
MD5 f2f5505600e2895c007b3ff3cfe3d4aa
SHA1 f0235a3c8056872d55eeef803d1bc33bac37a753
SHA256 cf11d6b3c18d4c02466b670bcb0394ac49382e6a87ad58d2561f2660922b586c
CRC32 9AF5ED3C
ssdeep 96:EtuCojGCPDXBqvsqvJCwoJtuCojGCPDXBqvsEHyqvJCworc7HwxGlUVul:Etu6XoJtu6bHnorXxY
Yara
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 6b86b273ff34fce1_6D6F4D.lck
Submit file
Filepath C:\Users\test22\AppData\Roaming\41D896\6D6F4D.lck
Size 1.0B
Processes 2656 (ConsoleApp12.exe)
Type very short file (no magic)
MD5 c4ca4238a0b923820dcc509a6f75849b
SHA1 356a192b7913b04c54574d18c28d46e6395428ab
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
CRC32 83DCEFB7
ssdeep 3:U:U
Yara None matched
VirusTotal Search for analysis
Name 245a2892f9bf30a0__ffgovsw.vbs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\_Ffgovsw.vbs
Size 198.0B
Processes 1116 (None)
Type ASCII text, with no line terminators
MD5 05dbffddc41d3e61de64a81845888c86
SHA1 62b79c1b7e7ac7d9ef83074806bd11395e0c71c8
SHA256 245a2892f9bf30a024f70ef3b60a79ab707cefa8ee41df88f678ef15a9cf5676
CRC32 D18204BB
ssdeep 6:FER/lFHsQdeGgdEYmRAumQpcLJaZ5SuH1MUmK57777brjK:+R/vsQkucYOLAHSuVM1c7777b/K
Yara
  • Ave_Maria_Zero - Remote Access Trojan that is also called WARZONE RAT
VirusTotal Search for analysis