Dropped Files | ZeroBOX
Name d3adcb5e1de23593_run.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\017BD04F-B3BF-45B6-8167-9E8F41FF87BF\run.dat
Size 8.0B
Processes 240 (RegSvcs.exe)
Type Non-ISO extended-ASCII text, with no line terminators
MD5 ac22c80ab2cbaf3400d9648d955c2101
SHA1 be77f64c20030a2da48ad506dd74a4f59bbe3f5f
SHA256 d3adcb5e1de2359333b7e5abe08cdc4f27b3ba6ed9ff42a37a1fdeee58f7e8aa
CRC32 2196FC79
ssdeep 3:Mtn:s
Yara None matched
VirusTotal Search for analysis
Name 3086d914f6b23268_tmp19D5.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp19D5.tmp
Size 1.3KB
Processes 240 (RegSvcs.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 8cad1b41587ced0f1e74396794f31d58
SHA1 11054bf74fcf5e8e412768035e4dae43aa7b710f
SHA256 3086d914f6b23268f8a12cb1a05516cd5465c2577e1d1e449f1b45c8e5e8f83c
CRC32 49853FE8
ssdeep 24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mXxtn:cbk4oL600QydbQxIYODOLedq3ZXj
Yara None matched
VirusTotal Search for analysis
Name bbb445d5b921494d_tmp161C.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp161C.tmp
Size 1.6KB
Processes 1068 (HTG~0000098765434567-098765432345678987654567.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 71301e752b6fa3bea0987a9862f4b4db
SHA1 145c12729d9a3b74db2b7e14acc9482a22adf841
SHA256 bbb445d5b921494d29de06113522b9d3ef1f93c38cc587d54b0efbb2b9918381
CRC32 4C039256
ssdeep 24:2dH4+SEqCH/7IlNMFQ/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBbXYtn:cbhf7IlNQQ/rydbz9I3YODOLNdq3Je
Yara None matched
VirusTotal Search for analysis
Name d46e34924067eb07_task.dat
Submit file
Filepath C:\Users\test22\AppData\Roaming\017BD04F-B3BF-45B6-8167-9E8F41FF87BF\task.dat
Size 57.0B
Processes 240 (RegSvcs.exe)
Type ASCII text, with no line terminators
MD5 08e799e8e9b4fda648f2500a40a11933
SHA1 ac76b5e20ded247803448a2f586731ed7d84b9f3
SHA256 d46e34924067eb071d1f031c0bc015f4b711edce64d8ae00f24f29e73ecb71db
CRC32 EEF8DB45
ssdeep 3:oMty8WddSWA1KMNn:oMLW6WA1j
Yara None matched
VirusTotal Search for analysis
Name bb9181b3935b8681_tmp1A92.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmp1A92.tmp
Size 1.3KB
Processes 240 (RegSvcs.exe)
Type XML 1.0 document, ASCII text, with CRLF line terminators
MD5 be81f72fa4dbc827132836ee2af92c96
SHA1 fe5ded04ab4932dea6cf414e9e4428f43da70d03
SHA256 bb9181b3935b8681a71b578f8166883e61380de6181df82d05f14829323fbf0f
CRC32 7AA438E3
ssdeep 24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0Rb5xtn:cbk4oL600QydbQxIYODOLedq3Sb5j
Yara None matched
VirusTotal Search for analysis
Name ef5d3bb04b07f170_fgsbcktcs.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\fgsbCktCS.exe
Size 1.1MB
Processes 1068 (HTG~0000098765434567-098765432345678987654567.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 a3fb8baaebd4544f3eca7dd0d4da2ad0
SHA1 491f4e160586a4df5a013351ba2edba81fccb594
SHA256 ef5d3bb04b07f1706fc16d4604555812f31bb57d885302fe3a7d6a92261dec29
CRC32 4AED727A
ssdeep 12288:tP7HXGP2iNh7QqoWB6xdxwXdwW/Kb/oZhKR1uyw10NzWMd:tPb2P1X7QA6/iXWWSbgjq1LwiNzNd
Yara
  • Admin_Tool_IN_Zero - Admin Tool Sysinternals
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • IsPE32 - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis