Dropped Files | ZeroBOX
Name b9c78eea4b8cdbd7_f3b6ecef712a24f33798f5d2fb3790c3d9b894c4
Submit file
Filepath C:\Windows\System32\imaadp32\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4
Size 543.0B
Processes 1040 (AudioEngine.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 d651c6300e7ff7c9d5fd9ceed7942a25
SHA1 8c0c50207d256f1c3f987b85e01ef792f9f7b5e8
SHA256 b9c78eea4b8cdbd726f2bd04b43684db07f990c71f14159d854012bfa16fd63a
CRC32 D8E42BCF
ssdeep 12:QeueMH88AzLdAmZ2oofk+BueFhapPsiCuT+OcWg1NPQyngrA:QevMH882dlZ2oo8+bFhapEjccWg1NPVH
Yara None matched
VirusTotal Search for analysis
Name 722e4aaf78e7fa56_audioengine.exe
Submit file
Filepath C:\Users\test22\AppData\Local\AudioEngine.exe
Size 792.5KB
Processes 1092 (ZZZZZ.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 4c37a2fac4c099afef07995215adf143
SHA1 d0fe8b202977929ef8816b06c0b4091db0ae357b
SHA256 722e4aaf78e7fa56289e62d52a8e137c981b2c269ed712c2696dfd97810592be
CRC32 C59524F3
ssdeep 12288:BWz5p20kC7ndOoh6H6Sh9oKexwHoe0ouyqn4Hsy6ZhkjEzOsXKUMhriBMMPCa:hoHmhGcz+4HPRQOsRCMc
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 59c2e372e4b4da8e_c5b4cb5e9653cce737f29f72ba880dd4c4bab27d
Submit file
Filepath C:\PerfLogs\Admin\c5b4cb5e9653cce737f29f72ba880dd4c4bab27d
Size 712.0B
Processes 1040 (AudioEngine.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 3180b37ed46e1bf43f2d26814ab3fbc7
SHA1 cee5a281d8a5b2f46c256c6bc293cf68ffcce9aa
SHA256 59c2e372e4b4da8efc45ff61923e029edc46eae1ea69fd75611862811901288c
CRC32 13159E61
ssdeep 12:pi1UwMtm7UXvPmbiWyZw/Y9g4m+bD+qmaYOGq3EsidWeydZRNg1LOBHOCQOABZ9M:puUFDv0gtzbD8b3Vy/g1LOZRQOABkMi
Yara None matched
VirusTotal Search for analysis
Name 0774108117e66ad4_24dbde2999530ef5fd907494bc374d663924116c
Submit file
Filepath C:\Python27\NEWS\24dbde2999530ef5fd907494bc374d663924116c
Size 122.0B
Processes 1040 (AudioEngine.exe)
Type ASCII text, with no line terminators
MD5 935ac5bde9021cc0f279525addbf1dd2
SHA1 89a101fabaa2e104dbbd415aabd9374f1aa360fe
SHA256 0774108117e66ad4101021c0ee3661e12b82bda0b289878262c8c1fdaa220701
CRC32 6247BABE
ssdeep 3:oK54m931rxslopxDBd3AX9dunXw6XOQRrE1MNqoVaW4n:oEhzlslSVdC5Q9A
Yara None matched
VirusTotal Search for analysis
Name cb6ff430a2eea7b3_sihost32.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
Size 8.0KB
Processes 1764 (AudioEngine.exe)
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5 fe5ee753ce35acce8868f0da42f7304e
SHA1 4796217436d674ef363e29030dbf814b9f6c0e9f
SHA256 cb6ff430a2eea7b35d3044e9a322512c3a51c2264ca5dd7355232212990b69af
CRC32 6495A0A7
ssdeep 96:1aMnMBnxNrmss+3bjXO792+jDXTDDusXXtyLxTIoDepTWwOgzNt:1A9moj492+jDjDLXXOYpTWu
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
VirusTotal Search for analysis
Name 19dd695667c01429_6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9
Submit file
Filepath C:\Windows\System32\NOISE\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9
Size 559.0B
Processes 1040 (AudioEngine.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 e6f514cd4c880dc10d52c8a76c937b53
SHA1 439f8eb038bdb55d25cd3c4f6892ec6f29cffe6e
SHA256 19dd695667c01429282ac1f0d2838a1ccdd44d9eb0efe2d29a073e9b9ff0fe9f
CRC32 8D9605D5
ssdeep 12:XbWmKF7GQsREcT0ajidPMB3ZmvUI1gbxuXcYxL40bYDqV:jiCREQilWFIujYnYC
Yara None matched
VirusTotal Search for analysis
Name afe8ce41cfe6aed4_videorecoderdrivemaster.exe
Submit file
Filepath C:\ProgramData\VideoRecoderDriveMaster.exe
Size 8.4MB
Processes 1164 (lsass.exe)
Type PE32+ executable (console) x86-64, for MS Windows
MD5 89059c81d1e7400ddfb518e9c7fa026b
SHA1 c544679ff6b2216d5784df2a4416d3579fe909e4
SHA256 afe8ce41cfe6aed40a92574505092c6068576d12e8269d7106b5dc895deb8be8
CRC32 A3D2317C
ssdeep 196608:fN9CcArjuqTq4Ka23sJKyILDU//yGd+BtHu3HR4IWg:fNVAIdWQvIX
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • themida_packer - themida packer
VirusTotal Search for analysis
Name 1db21b34642a8c00_2909dfdb85cd34aa41a28c3340d3d9f78c7f71fa
Submit file
Filepath C:\ProgramData\Microsoft\Windows\Templates\2909dfdb85cd34aa41a28c3340d3d9f78c7f71fa
Size 271.0B
Processes 1040 (AudioEngine.exe)
Type ASCII text, with no line terminators
MD5 fe960325f46ff87df8302d5250afbdf7
SHA1 50b3e36277eb6dbaa05dfdd548e3016d7a257524
SHA256 1db21b34642a8c0065fd812eabe68b278b70e743af54d4b4a2f63722adb44bc5
CRC32 DD4E19A8
ssdeep 6:7LwfIzxVQ1TmT9nASWSX9OkhwefDb3Rjm8K7eacz3:Yf+cmTlWYbLRjLAefz3
Yara None matched
VirusTotal Search for analysis
Name af84a9559fdd6e1b_ad905248ae8915310f4f54ea4fdbd093383798d1
Submit file
Filepath C:\Python27\NEWS\ad905248ae8915310f4f54ea4fdbd093383798d1
Size 285.0B
Processes 1040 (AudioEngine.exe)
Type ASCII text, with no line terminators
MD5 478a81b8358b2a8f3c278e46ae5f6409
SHA1 f660cab62e1eef55553ba051ab8caa0cab0713d1
SHA256 af84a9559fdd6e1b313d53accdeace574db25a904fd507b65b5e86965a4ddf25
CRC32 24755BB4
ssdeep 6:nvuvP2cViW4XypBixMlinJDjnm9M3nDUQ5cRNyvgq5UkGWzs8x5:n0P2gNixginNjnm9M3DUQCzyXWi
Yara None matched
VirusTotal Search for analysis
Name 5aed6af7cdcebf27_101b941d020240259ca4912829b53995ad543df6
Submit file
Filepath C:\Windows\System32\sdengin2\101b941d020240259ca4912829b53995ad543df6
Size 840.0B
Processes 1040 (AudioEngine.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 07decd8893ef9c51b9ac87f7b2ab8326
SHA1 9a11c0f263215f6648b6ff1c9c39a8531d7b954c
SHA256 5aed6af7cdcebf2718f683ca122c33aa36f25d76d3152f1aa26e1faf5c422e6b
CRC32 01AF0ACA
ssdeep 12:B+pnqqV8vFrPjkQRNHps+EmqVmrpIo0yh2DnDynZCG6Hfx6ZUBmNg8YzgRDXxLd+:B+2dPVRfrfqVqUynCmx+3zKL2a8ZTyM
Yara None matched
VirusTotal Search for analysis
Name 0047038be45189aa_realtekhd.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\RealtekHD.exe
Size 1.9MB
Processes 1092 (ZZZZZ.exe)
Type PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
MD5 47e421842ec51a177050ab80ff86d6d4
SHA1 5127a94235c3f7e05dbc47a2755e5c40697a39cf
SHA256 0047038be45189aa4fbc83794f9c5f47cc1713bf89c23f1c50721c7e28326e5e
CRC32 C30FF873
ssdeep 49152:c5scpS7Q4HT9jnpNhQFOFRihJrh3fJKhL7TzF4Bd9nGgoYVJ8/tcuIsuU7UFid:ldZz9jnqFoRiDrhvJkvF8d9nJ8S2oF
Yara
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis