Dropped Files | ZeroBOX
Name 824fae3331b95e2f_temp
Submit file
Filepath C:\ProgramData\540362256102805\temp
Size 40.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 41c19a9e8541fcb934c13c075bf47721
SHA1 648a7622d533d79b9a0bb31dc370134ec3a75ed7
SHA256 824fae3331b95e2f88ca60c87a6c9569086906ec76fc1db8d6dee9adddc4e80c
CRC32 560F7642
ssdeep 48:+35TqYzDGF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:Ulce7mlcwilGc7Ha3f+u
Yara None matched
VirusTotal Search for analysis
Name ca97d90dad9d3459__5403622561.zip
Submit file
Filepath C:\ProgramData\540362256102805\_5403622561.zip
Size 69.5KB
Processes 2704 (serverzx.exe)
Type Zip archive data, at least v2.0 to extract
MD5 1ea7f35b8d857be0eb25f7d0c0bca5a0
SHA1 0b8bc3828da43b659718c0c544233ec6ff6d899f
SHA256 ca97d90dad9d345920b49e212435caa7ef99ea70b0c7e3903e88af7d7b157d8c
CRC32 B4ECB66B
ssdeep 1536:dOr3r3SYN4jTpz1Jh8OUfrfaOlxd0gbJt5BEN220hWgt:ur1mpzvafrfJxtpBEN220hWgt
Yara None matched
VirusTotal Search for analysis
Name 9fb49d202c1626d9_outlook.txt
Submit file
Filepath C:\ProgramData\540362256102805\outlook.txt
Size 146.0B
Processes 2704 (serverzx.exe)
Type ASCII text, with CRLF line terminators
MD5 631bbbfde9e79db96c18b4db9fbed44f
SHA1 97807f662a31fef6034c1cf2a756aedc61f661b1
SHA256 9fb49d202c1626d9c3b274ad7e12ce4a09a2798dbf79b9dcce1e244aa57002a5
CRC32 543A2B3C
ssdeep 3:VPFe81L94whnI/MBogYovRLMKAt2QscPQBodFR1dA2PF0r6FIuGAWKnv:V9tnI/MBrFvR4RtdCod1dA2tpGi
Yara None matched
VirusTotal Search for analysis
Name a770ecba3b08bbab_freebl3.dll
Submit file
Filepath C:\ProgramData\freebl3.dll
Size 326.5KB
Processes 2704 (serverzx.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 ef2834ac4ee7d6724f255beaf527e635
SHA1 5be8c1e73a21b49f353c2ecfa4108e43a883cb7b
SHA256 a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba
CRC32 B698D0CA
ssdeep 6144:C8YBC2NpfYjGg7t5xb7WOBOLFwh8yGHrIrvqqDL6XPowD:CbG7F35BVh8yIZqn65D
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 88f9dc0b9a633e43_temp
Submit file
Filepath C:\ProgramData\540362256102805\temp
Size 512.0KB
Type SQLite 3.x database, user version 11, last written using SQLite version 3031001
MD5 dd47ebe6866ad2ab59d0caa1de28d09e
SHA1 afdf6eb7a01bb7ef4c9d768b65abbbeae5ba2663
SHA256 88f9dc0b9a633e43c6d2c6fae136e782c15aa38c1601dcff948987f1c2a391c3
CRC32 8DEE9EEA
ssdeep 24:DQHtJl32mNVpP965hKN0MG/lZpNjCKRIaU5BnCMOkC0JCpL3FYay:DQfrbWTTTqtStLm
Yara None matched
VirusTotal Search for analysis
Name fd4c9fda9cd3f9ae_temp-shm
Submit file
Filepath C:\ProgramData\540362256102805\temp-shm
Size 32.0KB
Type data
MD5 b7c14ec6110fa820ca6b65f5aec85911
SHA1 608eeb7488042453c9ca40f7e1398fc1a270f3f4
SHA256 fd4c9fda9cd3f9ae7c962b0ddf37232294d55580e1aa165aa06129b8549389eb
CRC32 DDC506B6
ssdeep 3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
Yara None matched
VirusTotal Search for analysis
Name c40bb03199a2054d_vcruntime140.dll
Submit file
Filepath C:\ProgramData\vcruntime140.dll
Size 81.8KB
Processes 2704 (serverzx.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 7587bf9cb4147022cd5681b015183046
SHA1 f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256 c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
CRC32 9BB5124B
ssdeep 1536:AQXQNgAuCDeHFtg3uYQkDqiVsv39niI35kU2yecbVKHHwhbfugbZyk:AQXQNVDeHFtO5d/A39ie6yecbVKHHwJF
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name 43536adef2ddcc81_softokn3.dll
Submit file
Filepath C:\ProgramData\softokn3.dll
Size 141.5KB
Processes 2704 (serverzx.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 a2ee53de9167bf0d6c019303b7ca84e5
SHA1 2a3c737fa1157e8483815e98b666408a18c0db42
SHA256 43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083
CRC32 760685C5
ssdeep 3072:UAf6suip+d7FEk/oJz69sFaXeu9CoT2nIVFetBWsqeFwdMIo:p6PbsF4CoT2OeU4SMB
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 3fe6b1c54b8cf28f_mozglue.dll
Submit file
Filepath C:\ProgramData\mozglue.dll
Size 134.0KB
Processes 2704 (serverzx.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 8f73c08a9660691143661bf7332c3c27
SHA1 37fa65dd737c50fda710fdbde89e51374d0c204a
SHA256 3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
CRC32 E28A5E21
ssdeep 3072:7Gyzk/x2Wp53pUzPoNpj/kVghp1qt/dXDyp4D2JJJvPhrSeTuk:6yQ2Wp53iO/kVghp12/dXDyyD2JJJvPR
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 16574f51785b0e2f_sqlite3.dll
Submit file
Filepath C:\ProgramData\sqlite3.dll
Size 630.5KB
Processes 2704 (serverzx.exe) 1236 (explorer.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 e477a96c8f2b18d6b5c27bde49c990bf
SHA1 e980c9bf41330d1e5bd04556db4646a0210f7409
SHA256 16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
CRC32 9F30A75E
ssdeep 12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • IsDLL - (no description)
VirusTotal Search for analysis
Name 334e69ac9367f708_msvcp140.dll
Submit file
Filepath C:\ProgramData\msvcp140.dll
Size 429.8KB
Processes 2704 (serverzx.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 109f0f02fd37c84bfc7508d4227d7ed5
SHA1 ef7420141bb15ac334d3964082361a460bfdb975
SHA256 334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
CRC32 97BCF588
ssdeep 12288:Mlp4PwrPTlZ+/wKzY+dM+gjZ+UGhUgiW6QR7t5s03Ooc8dHkC2es9oV:Mlp4PePozGMA03Ooc8dHkC2ecI
Yara
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • UPX_Zero - UPX packed file
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
VirusTotal Search for analysis
Name 0a0aadbb83a5e185__5403622561.zip
Submit file
Filepath C:\ProgramData\540362256102805\_5403622561.zip
Size 68.8KB
Processes 2704 (serverzx.exe)
Type Zip archive data, at least v2.0 to extract
MD5 9675d359d59cd359fdd940bd100e6e4e
SHA1 01fb40f3f2f46970b7ab1683de6912d5b25127de
SHA256 0a0aadbb83a5e1856aa6c23ceccc1c3990bf8126bb5b49e17d22b33fc57853a9
CRC32 46F56370
ssdeep 1536:dOr3r3SYN4jTpz1Jh8OUfrfaOlxd0gbJt5BEN220hWgj:ur1mpzvafrfJxtpBEN220hWgj
Yara None matched
VirusTotal Search for analysis
Name 123a594b384f8ea8_system.txt
Submit file
Filepath C:\ProgramData\540362256102805\system.txt
Size 2.6KB
Processes 2704 (serverzx.exe)
Type ISO-8859 text, with CRLF line terminators
MD5 391cb6823a5e7e02b1fafe25127262d8
SHA1 864f42bc074fcb97628475506c5fbdd3eeee1953
SHA256 123a594b384f8ea89bf7c90d468cfd2c546d7fef131c09c968c08a74c15119f2
CRC32 33B9C59C
ssdeep 48:7RU1taF4ZVGrSzNcs18ktfiWVuxw4lAPHblZNWgxEiKFhIjIx2OxPi6yA4yPpX:7RerfQev1HtfiWVuxw4lE7lZNWguiKFD
Yara None matched
VirusTotal Search for analysis
Name e2935b5b28550d47_nss3.dll
Submit file
Filepath C:\ProgramData\nss3.dll
Size 1.2MB
Processes 2704 (serverzx.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 bfac4e3c5908856ba17d41edcd455a51
SHA1 8eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256 e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
CRC32 9F24F4E3
ssdeep 24576:Sb5zzlswYNYLVJAwfpeYQ1Dw/fEE8DhSJVIVfRyAkgO6S/V/jbHpls4MSRSMxkoo:4zW5ygDwnEZIYkjgWjblMSRSMqH
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • OS_Processor_Check_Zero - OS Processor Check
  • IsPE32 - (no description)
  • IsDLL - (no description)
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
VirusTotal Search for analysis
Name 8916fb1d76be83e4_temp
Submit file
Filepath C:\ProgramData\540362256102805\temp
Size 192.0KB
Type SQLite 3.x database, user version 4, last written using SQLite version 3031001
MD5 6b9c2ac2b5025e180231d8d38ece698c
SHA1 36f5cfe6ac59aaa7d7173555edeef5caa9bf61c6
SHA256 8916fb1d76be83e42cd2f7b41ee06706fe0adb936259ed7a7daa4dbcb4c51fcb
CRC32 95ACFD74
ssdeep 12:DBl/lkf12Of5LZWfY0xpMujuHWMu6N2OHjWOzMbdym/eRgBoQFmgW2FOmO6Mz6LX:DLlI1x7WxHaiSlMxosJF/Ezo
Yara None matched
VirusTotal Search for analysis
Name 430ac8fe1b764fd7_serverzx.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\serverzx.exe
Size 393.0KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 c11accc6b91c118a30fc9ea60b72258b
SHA1 e755b8a318bf454cf58eda24e59dd843a8fbf3dc
SHA256 430ac8fe1b764fd7c42a316d36eaf32af003075f617bceb6651aa6be37c6290a
CRC32 20B81ACA
ssdeep 12288:Mhxa14KVW/9yl28uLkdEoHtDeQlkVBYk8pt1:MravVW1ykMx5lUBk1
Yara
  • PE_Header_Zero - PE File Signature
  • Generic_Malware_Zero - Generic Malware
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
VirusTotal Search for analysis
Name 8574731c05db5156_screenshot.jpg
Submit file
Filepath C:\ProgramData\540362256102805\screenshot.jpg
Size 71.2KB
Processes 2704 (serverzx.exe)
Type JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1024x768, frames 3
MD5 3c4e12b62c1c8bb40c5a2b28d5d86a9e
SHA1 2e4b1d3242fd404c71a95f15c177d55e6158255b
SHA256 8574731c05db515653cc008b3b788ed63dfd5f20e4e15386fce3524cb4654775
CRC32 165AC61D
ssdeep 1536:4bq8WZluRn40PQ0dSBI/LoQswG+hE6jXjk/Kn0drBztTQ0k95J3Gqrk3:GqmJ40I0Njz/ECXjkin0dbPF3
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 5ac38599602ea405_temp
Submit file
Filepath C:\ProgramData\540362256102805\temp
Size 36.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 fc7f547105f70363ae4555407e11909d
SHA1 bb61e033d2fc6544faf841499dff1e1bba06a080
SHA256 5ac38599602ea405d981edb457a5da893debf69ae3271b671135ce03e683db04
CRC32 FA691786
ssdeep 24:TLc80RlPbXaFpEO5bNmISHdL6UwcOxv7SBl:T4LOpEO5J/KdGU1E2z
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_temp-wal
Empty file or file not found
Filepath C:\ProgramData\540362256102805\temp-wal
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 915dd6370c01bf55_Thunderbird_g8t0pe67.default-release.txt
Submit file
Filepath C:\ProgramData\540362256102805\cookies\Thunderbird_g8t0pe67.default-release.txt
Size 357.0B
Processes 2704 (serverzx.exe)
Type ASCII text, with CRLF line terminators
MD5 5e52ae0ab76f7db35d0873b986c1c3f7
SHA1 7e49b5cbe09da1b7d044cd84231830a707662845
SHA256 915dd6370c01bf552b13c3a6f9b268fb6c7aaf4a06a258ed7ecfe661db2471e2
CRC32 2DDF4481
ssdeep 6:JihKT6lphXX7aQ2vSI95Bj9GfBHthf+CthfMl0kq/H+LkihKT6lphXXrSdrNBPPm:JZohXraQ2v795BxGfBHff+CffMOkqP0b
Yara None matched
VirusTotal Search for analysis
Name 06fce454b964f8a6_temp
Submit file
Filepath C:\ProgramData\540362256102805\temp
Size 80.0KB
Type SQLite 3.x database, last written using SQLite version 3033000
MD5 7c9e768ab93f73497a35470de07c2ada
SHA1 5c2bb051e15ed92187bad616d489ada38e34e04b
SHA256 06fce454b964f8a6dd0bc941a34ac0054159a400be65f3d9b6a1cd76668c01be
CRC32 6849234A
ssdeep 96:JBc7fYLKYZCIdE8XwUWaPdUDg738Hsa/NhuK0l0q8oc5PyWTJereWb3lxzasq9uE:JBPOUNlCTJMb3rEDFAl67/
Yara None matched
VirusTotal Search for analysis