Dropped Files | ZeroBOX
Name 12013662c71da69d_i[1].zip
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\i[1].zip
Size 300.7KB
Processes 2064 (iexplore.exe)
Type ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
MD5 eec5c6c219535fba3a0492ea8118b397
SHA1 292559e94f1c04b7d0c65d4a01bbbc5dc1ff6f21
SHA256 12013662c71da69de977c04cd7021f13a70cf7bed4ca6c82acbc100464d4b0ef
CRC32 963F6BC5
ssdeep 6144:T2s/gAWuboqsJ9xcJxspJBqQgTuaJZRhVabE5wKSDP99zBa77oNsKqqfPqOJ:T2s/bW+UmJqBxAuaPRhVabEDSDP99zBT
Yara
  • Eir_D1000_Wireless_Router_Vulnerability_Zero - Eir D1000 Wireless Router - WAN Side Remote Command Injection
  • Mozi_botnet_IoT_malware - Mozi botnet IoT malware
  • IsELF - Executable and Linking Format executable file (Linux/Unix)
VirusTotal Search for analysis