Dropped Files | ZeroBOX
Name d6431d5645fffd05_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2060 (powershell.exe)
Type data
MD5 260d23ce04a8f8555a73b7d2dc15e911
SHA1 ebad746fb7de847c50f7502a44f6e35534733efd
SHA256 d6431d5645fffd05a23166d630253bc7ce8c099cf6e9c956f8ae5e1249ee8588
CRC32 11D6B213
ssdeep 96:ctuCeGCPDXBqvsqvJCwo5tuCeGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:ctvXo5tvbHnorrxQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name a9220271c0eb79e5_d93f411851d7c929.customDestinations-ms~RFefca98.TMP
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFefca98.TMP
Size 7.8KB
Type data
MD5 b0c9ff441742f3847ea27da9dee7f2cd
SHA1 c42a1eb32ba953a0ce5d8635caabf71b5b281495
SHA256 a9220271c0eb79e5750e0d0e62058ecac560e09cdf9e82ef61aeeabada5d48a4
CRC32 0BBCAB1A
ssdeep 96:RutuCOGCPDXBqvsqvJCwo+utuCOGCPDXBqvsEHyqvJCworSP7Hwxf2lUVul:UtvXoxtvbHnorrxQ
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name e00d6c5110f3988a_nig_guy1.exe
Submit file
Filepath C:\Users\test22\AppData\Roaming\nig_guy1.exe
Size 63.0KB
Processes 804 (nigguy_1.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 956cfe237eb679042d0eb89f8097f091
SHA1 ec20cef5ce48dfcc9c4e0102b5e0734206301462
SHA256 e00d6c5110f3988acb9195ca3e5039fdfe37c27fc24e4edf2b29c84fba7c74d2
CRC32 73366F75
ssdeep 768:pvaGKWeDftiPJ5eiq9JmbHFhFtejR1+AALCv7mqb2nqpwH1o8047IjPKqGntpqKX:ZYf+0QgRgGbbVwH0472VGntpqKmY7
Yara
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Malicious_Library_Zero - Malicious_Library
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Malicious_Packer_Zero - Malicious Packer
  • Antivirus - Contains references to security software
VirusTotal Search for analysis
Name 83a57ad3e7aff106_stlr.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\stlr.exe
Size 73.5KB
Processes 804 (nigguy_1.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 677e4097ccfe521428c1c724827bbba4
SHA1 3cb5466286ff86054fddd502dd0113bfe1e4ee09
SHA256 83a57ad3e7aff106013413eb7be7e25ac114950e9e8ca64977f3603b6546dcec
CRC32 325986DA
ssdeep 1536:kiQvmZc9q8nYVlOoA7qx3U+lT9DgqO7LNNtSI2II:khvmZuq8qA7tUxrO7LNNtSI2II
Yara
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • PWS_CnC_binary_Zero - Communications PWS network
  • Is_DotNET_EXE - (no description)
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis