Dropped Files | ZeroBOX
Name c4cf62bd0c71b504_miner.bat
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP000.TMP\miner.bat
Size 816.0B
Processes 2232 (miner.EXE)
Type ASCII text, with CRLF line terminators
MD5 901084b1bce047ff791d6c5ea062539f
SHA1 d0f1d9dcb35a8d4662842cdb176430ca2d4b09be
SHA256 c4cf62bd0c71b504f5735094984572fd1c2a37041cb71acb5b2c0c0527b1fbf1
CRC32 FCC2B431
ssdeep 12:mO4NRYvGkLLIyMB9YvGkzMriRSw/w/Fsw/Fsw/w/w/Fsw/Fsw/Fsw/Fsw/Fsw/E:mO4UO69O1gzInnIInnnnn8
Yara None matched
VirusTotal Search for analysis
Name f4d28cf0f12006f9_590aee7bdd69b59b.customDestinations-ms~RF22e6b71.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF22e6b71.TMP
Size 7.8KB
Processes 2888 (powershell.exe) 2212 (powershell.exe)
Type data
MD5 b770148dd160455bac8fe186a882733d
SHA1 f41e6e10cf42b4aa831f43abfb27c031bf0f3d4a
SHA256 f4d28cf0f12006f93de9b6181d36369c8d85b6021f830ea407d76585cbda8b1e
CRC32 94B533F7
ssdeep 96:EtuCojGCPDXBqvsqvJCwoJtuCojGCPDXBqvsEHyqvJCwor3tDHXyGlUVul:Etu6XoJtu6bHnordTyY
Yara
  • Antivirus - Contains references to security software
VirusTotal Search for analysis