Dropped Files | ZeroBOX
Name 7aefd682a732766f_acnzejv45g4.txt
Submit file
Filepath C:\Users\Public\Pictures\acnzejv45g4.txt
Size 24.0KB
Processes 3032 (alg.exe)
Type UTF-8 Unicode text, with CRLF, LF line terminators
MD5 74b1e0efcb199b63c018b6c871b96266
SHA1 c3deac097d13103e886ec109c96d69ddc0f76686
SHA256 7aefd682a732766f3445e5787dc070ee92ddfe43c18363944625816a9aabe970
CRC32 891CF0E1
ssdeep 384:o71xS7oot4wMwg49GGc5GJcNsUKYE5vdp76iC:ow4wc157q2
Yara
  • anti_vm_detect - Possibly employs anti-virtualization techniques
VirusTotal Search for analysis
Name 139ee25d6f2e95da_gfhrwhdbyka.zip
Submit file
Filepath C:\Users\Public\Pictures\gfhrwhdbyka.zip
Size 65.6KB
Processes 3032 (alg.exe)
Type Zip archive data, at least v2.0 to extract
MD5 e6f5cb7633ef2ac353aa8ee26a879338
SHA1 9c02e7fc5c1a0edaf98f2fc043b261142a790b2a
SHA256 139ee25d6f2e95da86c6c708fc278443d7b69cc3c78e3902c17d9780dff63223
CRC32 4152AE12
ssdeep 1536:PGdm90OAAgANnpkTyrSKp3hRyDsjHRRrL9FUKQoQ4U8/WytkHgnoz1s:PGR8gokTyrSKp3hRyyHRx9FBN/U8/WyH
Yara
  • zip_file_format - ZIP file format
  • infoStealer_browser_b_Zero - browser info stealer
VirusTotal Search for analysis