Dropped Files | ZeroBOX
Name e6d66d2705d68f2d_marinaras.txt
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\abcens\clockradioers\Persien\marinaras.txt
Size 15.6KB
Processes 2560 (DaHost.exe)
Type data
MD5 8e202c9c2cd8980d97bc8bf8f4e18429
SHA1 3e4b8132a66c65a769d6648d3d15f99aab918279
SHA256 e6d66d2705d68f2dba62a2ed425e9f7ff0aee0d1dfdd18b321279ec0e753c80a
CRC32 AB9D3F15
ssdeep 384:9GFeRFmxvMYA9vz7nU3IYkxsGcFU5jRroe3QjbLORX//6:9GFeq1MYmnMZMwFU/roe3iOxH6
Yara None matched
VirusTotal Search for analysis
Name 2e226715419a5882_system.dll
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\nsw26D.tmp\System.dll
Size 11.5KB
Processes 2560 (DaHost.exe)
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 a4dd044bcd94e9b3370ccf095b31f896
SHA1 17c78201323ab2095bc53184aa8267c9187d5173
SHA256 2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
CRC32 EC59B7B0
ssdeep 192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
Yara
  • IsDLL - (no description)
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 20f4fe6abf3adf66_adoniserne.lib
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\abcens\clockradioers\Persien\Adoniserne.Lib
Size 108.2KB
Processes 2560 (DaHost.exe)
Type data
MD5 1ae1d374e438f6fd57ced4a8277c7c88
SHA1 c28a6dea35afde3ab0d65213b65b69ceeec8e249
SHA256 20f4fe6abf3adf66eed7f9aabde3988f167a7276870ea4e9c4712d3df800e86e
CRC32 089DF4F4
ssdeep 3072:S2Yv9ah6gliwq89as7IN4rdkapFmtBPBwibbIpHde8AHWuNrJ:tYzq6rs7IyrdxddmNV
Yara None matched
VirusTotal Search for analysis
Name e3b0c44298fc1c14_nseF02C.tmp
Empty file or file not found
Filepath C:\Users\test22\AppData\Local\Temp\nseF02C.tmp
Size 0.0B
Type empty
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
CRC32 00000000
ssdeep 3::
Yara None matched
VirusTotal Search for analysis
Name 85774a8283674936_jasperite.txt
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\abcens\clockradioers\Persien\jasperite.txt
Size 53.9KB
Processes 2560 (DaHost.exe)
Type data
MD5 3eb6f7b8291e89fc600baceeb5c5dd78
SHA1 bf381991b53a4594b0b2d137086021e26ec03a1b
SHA256 85774a82836749364fba61d7140370384d05a3eff9f1c4b9cfcaf33bd42b75b2
CRC32 FD8D6CB3
ssdeep 1536:CjqK0LYh08TJXFilgsmuB9xaADxkGe1qhbDH2MtYApXIoy3Ua:XLE0+JXqgstrxaADCT1qhbyMtx439
Yara None matched
VirusTotal Search for analysis
Name bc06cf5a868851c4_tristich.lnk
Submit file
Filepath C:\Users\test22\AppData\Local\Tristich.lnk
Size 1.0KB
Processes 2560 (DaHost.exe)
Type MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 15:32:08 1600, mtime=Sun Dec 31 15:32:08 1600, atime=Sun Dec 31 15:32:08 1600, length=0, window=hide
MD5 87de8611b24b2480771173d0e993583c
SHA1 c76bf64e1ab433596a74640f3fe732307547e85b
SHA256 bc06cf5a868851c48a0f32a96a39b65ae05aa418c71c60ccdc2db650433f5ae0
CRC32 E1D9C38B
ssdeep 12:8wl0KY3HV7GyuR+/fG9raGalGd/MJsW+jC4GSa/mo/omNJkKA54t2YLEPKzlX8:8NZqRQFbljyjC4jEoCHADPy
Yara
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis