Dropped Files | ZeroBOX
Name 9601350af95d19eb_nest
Submit file
Filepath C:\Users\Public\nest
Size 9.0B
Processes 2084 (zCloud.exe)
Type ASCII text, with CRLF line terminators
MD5 ef05ee762b2bbd07a44c317fd57b45d4
SHA1 10b250ca52765154fd32c92c9590cc197beca6e3
SHA256 9601350af95d19ebc7d6abe2fd654c65779af1c5a9c669446749df591523e0f6
CRC32 C83817D2
ssdeep 3:r7:3
Yara None matched
VirusTotal Search for analysis
Name 24222300c78180b5_Trast.bat
Submit file
Filepath C:\Users\Public\Trast.bat
Size 34.0B
Processes 2084 (zCloud.exe)
Type ASCII text, with no line terminators
MD5 4068c9f69fcd8a171c67f81d4a952a54
SHA1 4d2536a8c28cdcc17465e20d6693fb9e8e713b36
SHA256 24222300c78180b50ed1f8361ba63cb27316ec994c1c9079708a51b4a1a9d810
CRC32 7F4F9BF9
ssdeep 3:LjTnaHF5wlM:rnaHSM
Yara None matched
VirusTotal Search for analysis
Name 37c59c8398279916_KDECO.bat
Submit file
Filepath C:\Users\Public\KDECO.bat
Size 155.0B
Processes 2084 (zCloud.exe)
Type ASCII text, with no line terminators
MD5 213c60adf1c9ef88dc3c9b2d579959d2
SHA1 e4d2ad7b22b1a8b5b1f7a702b303c7364b0ee021
SHA256 37c59c8398279916cfce45f8c5e3431058248f5e3bef4d9f5c0f44a7d564f82e
CRC32 42292F53
ssdeep 3:LjT5LJJFIf9oM3KN6QNb3DM9bWQqA5SkrF2VCceGAFddGeWLCXlRA3+OR:rz81R3KnMMQ75ieGgdEYlRA/R
Yara None matched
VirusTotal Search for analysis
Name 34400bb7662a1aa0_hjaysdp.exe
Submit file
Filepath C:\Users\Public\Libraries\Hjaysdp\Hjaysdp.exe
Size 1.1MB
Processes 2084 (zCloud.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c6855b8e550bcdd88084643f747070ac
SHA1 63cea165c1d9fcfcfa2fe8e6da5a185193e31c08
SHA256 34400bb7662a1aa0865f6ec06892fff142dd3ff8d09464141f75a96a42724493
CRC32 F34A6FF6
ssdeep 12288:lIspEfnP8N/seflQTshT8aqeTW39KqGeoAdrL7SUbDz5Zp:320N/seflZhTmiW3AyrPzz5Z
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • Malicious_Library_Zero - Malicious_Library
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name d7dc547952a7736c_pdsyajh.url
Submit file
Filepath C:\Users\Public\Libraries\pdsyajH.url
Size 96.0B
Processes 2084 (zCloud.exe)
Type MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Hjaysdp\\Hjaysdp.exe">), ASCII text, with CRLF line terminators
MD5 f423b400a0e25998aed8e7be8a7bc669
SHA1 9c13ecb66e9bbcede4929e30c1b6bc2beee0819c
SHA256 d7dc547952a7736c724ce990051f553ca8e4d0ec26fcdfef1653c5a2275691e8
CRC32 0CDE045F
ssdeep 3:HRAbABGQYmTWAX+rSF55i0XM3Wx8noAHysGKd6ov:HRYFVmTWDyzp8dSsbDv
Yara None matched
VirusTotal Search for analysis
Name f35f2658455a2e40_UKO.bat
Submit file
Filepath C:\Users\Public\UKO.bat
Size 250.0B
Processes 2084 (zCloud.exe)
Type ASCII text, with CRLF line terminators
MD5 eaf8d967454c3bbddbf2e05a421411f8
SHA1 6170880409b24de75c2dc3d56a506fbff7f6622c
SHA256 f35f2658455a2e40f151549a7d6465a836c33fa9109e67623916f889849eac56
CRC32 8C4E367F
ssdeep 6:rgnMXd1CQnMXd1COm8hnaHNHIXUnMXd1CoD9c1uOw1H1gOvOBAn:rgamIHIXUaXe1uOeVqy
Yara None matched
VirusTotal Search for analysis
Name 45aa3957c2986526_nest.bat
Submit file
Filepath C:\Users\Public\nest.bat
Size 53.0B
Processes 2084 (zCloud.exe)
Type ASCII text, with CRLF line terminators
MD5 8ada51400b7915de2124baaf75e3414c
SHA1 1a7b9db12184ab7fd7fce1c383f9670a00adb081
SHA256 45aa3957c29865260a78f03eef18ae9aebdbf7bea751ecc88be4a799f2bb46c7
CRC32 989CB101
ssdeep 3:LjT9fnMXdemzCK0vn:rZnMXd1CV
Yara None matched
VirusTotal Search for analysis