Dropped Files | ZeroBOX
Name a8a60dea4b081db5_tmpA2A3.tmp
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\tmpA2A3.tmp
Size 1.5KB
Processes 2720 (eme.pif)
Type XML 1.0 document, ASCII text
MD5 6238a2e2df5c50e4960509ae6a35f6a4
SHA1 36caa7ef1d846eef406d9ca5f87077262c7afa89
SHA256 a8a60dea4b081db5c5b3681e349a71fd7e01f85cf333da0c234a895efda8625c
CRC32 D1D38FC6
ssdeep 24:2di4+S2qhH/1ny1mEUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtfJxvn:cgefAYrFdOFzOzN33ODOiDdKrsuTf/v
Yara None matched
VirusTotal Search for analysis
Name b7c225ef3cc3e875_d93f411851d7c929.customDestinations-ms~RF1a6cafc.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1a6cafc.TMP
Size 7.8KB
Processes 2560 (powershell.exe) 3068 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Generic_Malware_Zero - Generic Malware
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 03c50c52cfe4a031_eme.pif
Submit file
Filepath C:\Users\Public\eme.pif
Size 691.0KB
Processes 2560 (powershell.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 8481fb36fe2375802264e3255c421629
SHA1 abbb159a6c3b305f4a8bd7209a9613cc93102ff7
SHA256 03c50c52cfe4a03150ad7dc5ce1e1a4199cac1414e871c52a661ed9fc586c6f9
CRC32 A91D752A
ssdeep 12288:mfimYMUnFW/NwbbHh9kFF7PYm5WjMBb78g79okfcWpD5pU9na61Jn8VSyK1Jps:mfiUi3HXc7PbzBd79lDPU9aY0j6Xs
Yara
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • hide_executable_file - Hide executable file
  • IsPE32 - (no description)
  • PE_Header_Zero - PE File Signature
VirusTotal Search for analysis