Dropped Files | ZeroBOX
Name a9220271c0eb79e5_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2620 (powershell.exe)
Type data
MD5 b0c9ff441742f3847ea27da9dee7f2cd
SHA1 c42a1eb32ba953a0ce5d8635caabf71b5b281495
SHA256 a9220271c0eb79e5750e0d0e62058ecac560e09cdf9e82ef61aeeabada5d48a4
CRC32 0BBCAB1A
ssdeep 96:RutuCOGCPDXBqvsqvJCwo+utuCOGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:UtvXoxtvbHnorrxQ
Yara
  • Generic_Malware_Zero - Generic Malware
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name c30bcdcd000d197d_Ryesfzsg-TikTiok-1.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\Ryesfzsg-TikTiok-1.exe
Size 505.5KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 e0ab3f64eb508f46ada07bc2d4ace395
SHA1 6f44fb6668d4b1a2545bc75e654a297856e3ea7f
SHA256 c30bcdcd000d197dd011f583f1f7cd6446e0b8ee722118de24c44f056563b752
CRC32 02B2B2EB
ssdeep 12288:O7SD4A1i6Dtqb1+VhYriovyjSfcMVPqOMHYbMZ:O7SLtBqb1eofEMVJM4bM
Yara
  • IsPE32 - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • Is_DotNET_EXE - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis