Dropped Files | ZeroBOX
Name 606d278b2e751192_i[1].zip
Submit file
Filepath C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\i[1].zip
Size 300.7KB
Processes 2072 (iexplore.exe)
Type ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
MD5 d533e4a1985ee9df9eb60e8bc4e0904d
SHA1 d99181ebfe5cd60f6cd0a938e78ae27d25fd182a
SHA256 606d278b2e75119296bf48721ae72deec87912742ce4d9920bf565521de4dcb0
CRC32 6849B493
ssdeep 6144:p3lOYoaja8xzx/0wsxzSiOabE5wKSDP99zBa77oNsKqqfPqOJ:p1CG/jsxzXOabEDSDP99zBa/HKqoPqOJ
Yara
  • SUSP_ELF_LNX_UPX_Compressed_File - Detects a suspicious ELF binary with UPX compression
  • Eir_D1000_Wireless_Router_Vulnerability_Zero - Eir D1000 Wireless Router - WAN Side Remote Command Injection
  • Mozi_botnet_IoT_malware - Mozi botnet IoT malware
  • IsELF - Executable and Linking Format executable file (Linux/Unix)
VirusTotal Search for analysis