Dropped Files | ZeroBOX
Name cbbcc393cda34eea_tmp7C38.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp7C38.tmp
Size 1.6KB
Processes 2952 (ac.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 c74ef8fdc31009142f7050dbd9a95fc0
SHA1 332fafa83b5bc080762ac59e3d68f00fdcfdd439
SHA256 cbbcc393cda34eea33d13647e7ef5b1f24aeddaa65f87a82794ba46ce0b877c1
CRC32 D59D21E6
ssdeep 24:2dH4+SEqCH/7IlNMFQ/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBatn:cbhf7IlNQQ/rydbz9I3YODOLNdq3C
Yara None matched
VirusTotal Search for analysis
Name 53c65fc1c8d98aaf_pyvwajxtpzu.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\pYVWAjXtpzU.exe
Size 463.0KB
Processes 2952 (ac.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 a9bd3a038170c1a41212c8e320b68d5d
SHA1 5a5640afa5d9f2b7a76337a83e37f9076a4d8a3a
SHA256 53c65fc1c8d98aafd58dd6bcf3409b6b3518ac35d87a980582791ba18ebf24dc
CRC32 316E3326
ssdeep 6144:rOCbwgU5slglUOmDFgew0fkfi3yMgCuOIxcHj1bXxkNwf1pJLet4dYo7C:igkmDFgetfA6EO/HJbIsLc4g
Yara
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
VirusTotal Search for analysis