Dropped Files | ZeroBOX
Name 4293c1d8574dc87c_i[1].zip
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\i[1].zip
Size 132.6KB
Processes 2112 (iexplore.exe)
Type ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
MD5 59ce0baba11893f90527fc951ac69912
SHA1 5857a7dd621c4c3ebb0b5a3bec915d409f70d39f
SHA256 4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7
CRC32 057611CE
ssdeep 3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xioP:p3lOYoaja8xzx/0wsxzSi2
Yara
  • SUSP_ELF_LNX_UPX_Compressed_File - Detects a suspicious ELF binary with UPX compression
  • Mozi_botnet_IoT_malware - Mozi botnet IoT malware
  • IsELF - Executable and Linking Format executable file (Linux/Unix)
VirusTotal Search for analysis