Dropped Files | ZeroBOX
Name 86246fd385fe8371__mqldrhdwbjgugr.vbs
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\_Mqldrhdwbjgugr.vbs
Size 154.0B
Processes 1080 (cop.exe)
Type ASCII text, with no line terminators
MD5 0c0aa1f913d79a39f89a815e6fead395
SHA1 550f98e08e1d364c32bdf1841489b7b0a72cb7ba
SHA256 86246fd385fe83711b425778c146db6d4cc667eb203563e9a5ea779ce29544bf
CRC32 4D1898F7
ssdeep 3:FER/n0eFHgSSJJFkBBVIceGAFddGeWLCXknRAumWxpcL4EaKC5nfmXYKlmX0dpFu:FER/lFHsQdeGgdEYmRAumQpcLJaZ5fI0
Yara
  • Ave_Maria_Zero - Remote Access Trojan that is also called WARZONE RAT
VirusTotal Search for analysis
Name cf11d6b3c18d4c02_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2088 (powershell.exe)
Type data
MD5 f2f5505600e2895c007b3ff3cfe3d4aa
SHA1 f0235a3c8056872d55eeef803d1bc33bac37a753
SHA256 cf11d6b3c18d4c02466b670bcb0394ac49382e6a87ad58d2561f2660922b586c
CRC32 9AF5ED3C
ssdeep 96:EtuCojGCPDXBqvsqvJCwoJtuCojGCPDXBqvsEHyqvJCworc7HwxGlUVul:Etu6XoJtu6bHnorXxY
Yara
  • Antivirus - Contains references to security software
VirusTotal Search for analysis