Dropped Files | ZeroBOX
Name 7d07f0659ac5ea75__jtmlhjynh.vbs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\_Jtmlhjynh.vbs
Size 140.0B
Processes 2220 (None)
Type ASCII text, with no line terminators
MD5 13a5684d681acd9e8f278da240294de3
SHA1 5622e30190107b9113f4d86bf12a11eb01d09946
SHA256 7d07f0659ac5ea753cf78da843d14622493dda0f91ccb7394dee8716f319e494
CRC32 02EAEDE0
ssdeep 3:FER/n0eFHgSSJJFkBBVIceGAFddGeWLCXknRAumWxpcL4E2J5LKKlmX0dpFjZM:FER/lFHsQdeGgdEYmRAumQpcLJ23fvdS
Yara
  • Ave_Maria_Zero - Remote Access Trojan that is also called WARZONE RAT
VirusTotal Search for analysis
Name cf11d6b3c18d4c02_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 204 (powershell.exe)
Type data
MD5 f2f5505600e2895c007b3ff3cfe3d4aa
SHA1 f0235a3c8056872d55eeef803d1bc33bac37a753
SHA256 cf11d6b3c18d4c02466b670bcb0394ac49382e6a87ad58d2561f2660922b586c
CRC32 9AF5ED3C
ssdeep 96:EtuCojGCPDXBqvsqvJCwoJtuCojGCPDXBqvsEHyqvJCworc7HwxGlUVul:Etu6XoJtu6bHnorXxY
Yara
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 09246f2ea95510e2_0wvgkjzrzg8t.bat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\0WVGkjZRZg8T.bat
Size 203.0B
Processes 2316 (None)
Type DOS batch file, ASCII text, with CRLF line terminators
MD5 18c3fb7dd721212d34664cef9feac21e
SHA1 a7bedc3bb5202fa5f5b6e36382438cfd67cfb545
SHA256 09246f2ea95510e2803adbbe0b78063c0be698c3d77ec9cbc66ab3c1fc3b0602
CRC32 B2C8562C
ssdeep 6:hC47bxrBeLuVFOOr+DE1mQpcLJ23fNvKOZG1mQpcLJ23fIP/8q:d5r+uVEOCDEJOLM0OLMgP/8q
Yara None matched
VirusTotal Search for analysis