Dropped Files | ZeroBOX
Name 24222300c78180b5_Trast.bat
Submit file
Filepath C:\Users\Public\Trast.bat
Size 34.0B
Processes 1684 (Oxqfxohrjqryauuonybvsdergonzrywtkp.exe)
Type ASCII text, with no line terminators
MD5 4068c9f69fcd8a171c67f81d4a952a54
SHA1 4d2536a8c28cdcc17465e20d6693fb9e8e713b36
SHA256 24222300c78180b50ed1f8361ba63cb27316ec994c1c9079708a51b4a1a9d810
CRC32 7F4F9BF9
ssdeep 3:LjTnaHF5wlM:rnaHSM
Yara None matched
VirusTotal Search for analysis
Name 37c59c8398279916_KDECO.bat
Submit file
Filepath C:\Users\Public\KDECO.bat
Size 155.0B
Processes 1684 (Oxqfxohrjqryauuonybvsdergonzrywtkp.exe)
Type ASCII text, with no line terminators
MD5 213c60adf1c9ef88dc3c9b2d579959d2
SHA1 e4d2ad7b22b1a8b5b1f7a702b303c7364b0ee021
SHA256 37c59c8398279916cfce45f8c5e3431058248f5e3bef4d9f5c0f44a7d564f82e
CRC32 42292F53
ssdeep 3:LjT5LJJFIf9oM3KN6QNb3DM9bWQqA5SkrF2VCceGAFddGeWLCXlRA3+OR:rz81R3KnMMQ75ieGgdEYlRA/R
Yara None matched
VirusTotal Search for analysis
Name 2df667c2a61c1cc1_oxqfxoh.exe
Submit file
Filepath C:\Users\Public\Libraries\Oxqfxoh\Oxqfxoh.exe
Size 678.0KB
Processes 1684 (Oxqfxohrjqryauuonybvsdergonzrywtkp.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 a8521386eacf0f858077249faa381763
SHA1 337fa5730d301ca3d37288ce932a04ebc0221d93
SHA256 2df667c2a61c1cc161df7e8e1d7dcf1407a0bc30eb7eaf881c835fecfde5f086
CRC32 DF151F90
ssdeep 12288:0SvSsA2JxPaLrNgLGKXhfLeoZ10VicVp7+SnqyUz:0AdLzPCrNgLfXhaoZuVTvpqyA
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name f35f2658455a2e40_UKO.bat
Submit file
Filepath C:\Users\Public\UKO.bat
Size 250.0B
Processes 1684 (Oxqfxohrjqryauuonybvsdergonzrywtkp.exe)
Type ASCII text, with CRLF line terminators
MD5 eaf8d967454c3bbddbf2e05a421411f8
SHA1 6170880409b24de75c2dc3d56a506fbff7f6622c
SHA256 f35f2658455a2e40f151549a7d6465a836c33fa9109e67623916f889849eac56
CRC32 8C4E367F
ssdeep 6:rgnMXd1CQnMXd1COm8hnaHNHIXUnMXd1CoD9c1uOw1H1gOvOBAn:rgamIHIXUaXe1uOeVqy
Yara None matched
VirusTotal Search for analysis
Name 45ee17ffaba4d208_hoxfqxo.url
Submit file
Filepath C:\Users\Public\Libraries\hoxfqxO.url
Size 96.0B
Processes 1684 (Oxqfxohrjqryauuonybvsdergonzrywtkp.exe)
Type MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Oxqfxoh\\Oxqfxoh.exe">), ASCII text, with CRLF line terminators
MD5 80debca9c629630b5b664594f1c21584
SHA1 0fb7598ec88e671c65b28505f1da6340894546e6
SHA256 45ee17ffaba4d20822cd89574026664259609a4e9600701592f4dde8299b59f0
CRC32 7CCFAD64
ssdeep 3:HRAbABGQYmTWAX+rSF55i0XM5W50dUBWL4iysGKd6ov:HRYFVmTWDyzR50WcL4bsbDv
Yara None matched
VirusTotal Search for analysis
Name 45aa3957c2986526_nest.bat
Submit file
Filepath C:\Users\Public\nest.bat
Size 53.0B
Processes 1684 (Oxqfxohrjqryauuonybvsdergonzrywtkp.exe)
Type ASCII text, with CRLF line terminators
MD5 8ada51400b7915de2124baaf75e3414c
SHA1 1a7b9db12184ab7fd7fce1c383f9670a00adb081
SHA256 45aa3957c29865260a78f03eef18ae9aebdbf7bea751ecc88be4a799f2bb46c7
CRC32 989CB101
ssdeep 3:LjT9fnMXdemzCK0vn:rZnMXd1CV
Yara None matched
VirusTotal Search for analysis
Name a1d4a1092051c573_nest
Submit file
Filepath C:\Users\Public\nest
Size 9.0B
Processes 1684 (Oxqfxohrjqryauuonybvsdergonzrywtkp.exe)
Type ASCII text, with CRLF line terminators
MD5 c415d26dfcc3322938d09d09890e64f2
SHA1 07fcdc00f389e8563a160406bde9567a437c7557
SHA256 a1d4a1092051c573362e1584b53b9e20db5e0673b110de4b377bd385b999203d
CRC32 B57D2415
ssdeep 3:gNov:gNy
Yara None matched
VirusTotal Search for analysis