Dropped Files | ZeroBOX
Name bb28d7beea6e3faa_ultramediaburner.exe
Submit file
Filepath c:\program files (x86)\ultramediaburner\ultramediaburner.exe
Size 370.0KB
Processes 540 (ultramediaburner.tmp)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 7124be0b78b9f4976a9f78aaeaed893a
SHA1 804f3e4b3f9131be5337b706d5a9ea6fcfa53e25
SHA256 bb28d7beea6e3faa641f69b9b4866858d87ca63f9eef15dae350b2dc28b537c3
CRC32 71E817F3
ssdeep 6144:C6wgO1EvXDFbVSSTV7hOaxssrdBICGxX5r2X2irS9lu9RH96u2:VwgOQXZbVZTVkazU5reTrS9lu9h96u
Yara
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 90fdd4ddf0f5700e_ultramediaburner.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-AD6UT.tmp\ultramediaburner.tmp
Size 700.0KB
Processes 1108 (ultramediaburner.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4e8c7308803ce36c8c2c6759a504c908
SHA1 a3ec8c520620c0f9c8760f5c2c3ef6ab593240dc
SHA256 90fdd4ddf0f5700ed6e48ac33b5ede896a2d67e314fb48f6d948ab01b5c7ea4c
CRC32 AA979291
ssdeep 12288:5QhCh1/aLmSKrPD37zzH2A6QGgx/bsQYq9KgERkVfzrrNVyblD4cNafNyx96U:5QYh1yLmSKrPD37zzH2A6QD/IpqggE2a
Yara
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 3e39d45b73379737_unins000.dat
Submit file
Filepath C:\Program Files (x86)\UltraMediaBurner\unins000.dat
Size 1.2KB
Processes 540 (ultramediaburner.tmp)
Type data
MD5 b001b00fb150f1c75ad6a169baf668a5
SHA1 0fd84768a70e4967aaf39810c31a1b0e919c091a
SHA256 3e39d45b733797376ac8e86863371df8142a35e994a38d003e469ef8bc48f5c9
CRC32 B2CB631F
ssdeep 24:3ZqgN7MktVM+ExafFIEdTVMoTVMVfz3eV387en:3QgKkt4xmFIO9sDeBn
Yara None matched
VirusTotal Search for analysis
Name 052a873204a4268d_ultramediaburner.lnk
Submit file
Filepath C:\Users\Public\Desktop\UltraMediaBurner.lnk
Size 1.1KB
Processes 540 (ultramediaburner.tmp)
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Jun 14 17:03:24 2021, mtime=Mon Jun 14 17:03:24 2021, atime=Mon Jul 29 20:08:38 2019, length=378880, window=hide
MD5 115458b00a8912b5cf4596391fc5d9be
SHA1 180395c7931f88e308b5a06bf4eec1f4df4a093e
SHA256 052a873204a4268d8e8b5da8eec91ddecb1fbcf66d4fe409d49e629243283094
CRC32 BF189D8F
ssdeep 24:8m7cdOEjSkd9ki8ADIEsdBkSk6dBkSUPPy/08:8m7cdOQ8+DIPd+V6d+Tny/08
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 9884e9d1b4f8a873__shfoldr.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-KOVPI.tmp\_isetup\_shfoldr.dll
Size 22.8KB
Processes 540 (ultramediaburner.tmp)
Type PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
CRC32 AE2C3EC2
ssdeep 384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
Yara
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name a063f4fdd085edb5_unins000.exe
Submit file
Filepath c:\program files (x86)\ultramediaburner\unins000.exe
Size 711.2KB
Processes 540 (ultramediaburner.tmp)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 18e11280408a26c5e080c9dd2e3ad17d
SHA1 bd87a3e1a3e0ed40cff9d45c8395b4718477beb9
SHA256 a063f4fdd085edb563b0902b9fbf469adb70826a7e233c5db3205714c7468bbe
CRC32 349BAD0D
ssdeep 12288:RQhCh1/aLmSKrPD37zzH2A6QGgx/bsQYq9KgERkVfzrrNVyblD4cNafNyx96L:RQYh1yLmSKrPD37zzH2A6QD/IpqggE2R
Yara
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name c16bfab406db3d40_ultramediaburner.lnk
Submit file
Filepath C:\ProgramData\Microsoft\Windows\Start Menu\Programs\UltraMediaBurner.lnk
Size 1.1KB
Processes 540 (ultramediaburner.tmp)
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Jun 14 17:03:24 2021, mtime=Mon Jun 14 17:03:24 2021, atime=Mon Jul 29 20:08:38 2019, length=378880, window=hide
MD5 3cc8f8be97eb2860c0def2a39a5c97b8
SHA1 d34147420a62dea0052cdf195905e560f181d55f
SHA256 c16bfab406db3d405286526d358989d7631d5250ccafea3bc837ce1dde25342a
CRC32 8B9C765A
ssdeep 24:8m7cdOEjSkd9ki8ADIEWdBkSk6dBkSUPPy/08:8m7cdOQ8+DIld+V6d+Tny/08
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 388a796580234efc__setup64.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\is-KOVPI.tmp\_isetup\_setup64.tmp
Size 6.0KB
Processes 540 (ultramediaburner.tmp)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
CRC32 2CDCC338
ssdeep 96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
VirusTotal Search for analysis