Dropped Files | ZeroBOX
Name 886f8e09fd7320d1_tmp4A6B.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp4A6B.tmp
Size 1.6KB
Processes 112 (microF.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 3ae622eeed26506df5751adbead84379
SHA1 1ec9377741049438e5417a94ec9001c768faaaf0
SHA256 886f8e09fd7320d1dd105d4c5d7c6f8b0b4ae797c3967ebb04b8f34239ae67e9
CRC32 9AF9EB4D
ssdeep 24:2dH4+SEqCH/7IlNMFQ/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBOtn:cbhf7IlNQQ/rydbz9I3YODOLNdq36
Yara None matched
VirusTotal Search for analysis
Name d44a2ec092a66bec_xqkwzyl.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\XQKwzyL.exe
Size 666.0KB
Processes 112 (microF.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 edaf5a29b05f9205678bf6df8417541c
SHA1 8cc6db4d7e8160933434ee5f413c510a1df088b5
SHA256 d44a2ec092a66bec26dabf98269fab0009b8309966e7a78fb0263b8c086d0c29
CRC32 79333F6B
ssdeep 12288:84ox+SHDB0+YVPahPbiAL6F5E7bEHsnMfdbraWa3yBcqp1SpEXHNY6YgSd4j2Asx:8ySHtYRahUcX8bp
Yara
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Generic_Malware_Zero - Generic Malware
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
VirusTotal Search for analysis