Dropped Files | ZeroBOX
Name ab8d66268c544da8_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 252.0B
Processes 2500 (svchost.exe)
Type data
MD5 39e506989dda1ba0d6cf1a27f087b032
SHA1 56dd05407a91417c87d852621c08650b58fd225f
SHA256 ab8d66268c544da89b71d6fceb3ea0f8181232433e098806be8a67e9d3437750
CRC32 1B6D3C75
ssdeep 3:kkFklvsfXfllXlE/Bi9llPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB15RNU2UPlN:kKnfOiZliBAIdQZV742MN
Yara None matched
VirusTotal Search for analysis
Name 96bcec06264976f3_2d85f72862b55c4eadd9e66e06947f3d
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Size 1.4KB
Processes 2500 (svchost.exe)
Type data
MD5 0cd2f9e0da1773e9ed864da5e370e74e
SHA1 cabd2a79a1076a31f21d253635cb039d4329a5e8
SHA256 96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
CRC32 65E5A5B2
ssdeep 24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
Yara None matched
VirusTotal Search for analysis
Name a2ce3a0fa7d2a833_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 893.0B
Processes 2500 (svchost.exe)
Type data
MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
CRC32 1C31685D
ssdeep 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
Yara None matched
VirusTotal Search for analysis
Name d0b661781f5429c0_c5d8393293ce2ba62f117b2c2d55bc3e_017bd04f-b3bf-45b6-8167-9e8f41ff87bf
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3832866432-4053218753-3017428901-1001\c5d8393293ce2ba62f117b2c2d55bc3e_017bd04f-b3bf-45b6-8167-9e8f41ff87bf
Size 1.4KB
Processes 2560 (None)
Type data
MD5 fecba042c7a22f0d9b477c9908da17cd
SHA1 623991224695654f38566558eac8edcedba42c52
SHA256 d0b661781f5429c02c894467baa52b62bd68b2d4f545fb3bee2e6d3bcd3cac90
CRC32 CFA0EAD2
ssdeep 24:SRDylUVsflVeMErdSL2V4KJ3aClPLmk8T9LbdabE7akUVTMhJe:S5ylU6XOSeMClJtf9MhJe
Yara
  • Trojan_Win32_Cutwail - Cutwail
VirusTotal Search for analysis
Name 4d79d5534fadec99_2d85f72862b55c4eadd9e66e06947f3d
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
Size 192.0B
Processes 2500 (svchost.exe)
Type data
MD5 2bd856e470e21c4040b88b569990c901
SHA1 a090b86e57470004dbf7b2d1b5421d3a72144f16
SHA256 4d79d5534fadec99e38b6b472d8509ae392aaeb476d2c32060d10a3420c11484
CRC32 C6AEBDFC
ssdeep 3:kkFkld3lXfllXlE/zMc57llXNNX8RolJuRdyo1dlUKlGXJlDdt:kKSl8157VNMa8Rdy+UKcXP
Yara None matched
VirusTotal Search for analysis