Dropped Files | ZeroBOX
Name 8ffbc1384721a00f_4375vtb45tv8225nv4285n2.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\4375vtb45tv8225nv4285n2.txt
Size 6.1KB
Processes 2688 (m1088338.exe)
Type ASCII text
MD5 500ca14537bd939a80943820221b4b4a
SHA1 e364423f3bbc1009c8f9b283e45ffc89b4baf3eb
SHA256 8ffbc1384721a00f754d1e86545cc2b49d66cd74d061cdcff3e0e535bc8efa8f
CRC32 C4FD9FA0
ssdeep 192:xieFoi2UrzYJRERgR+RTUR2R4R91q1dfdKaYmO5ltztZBa375n3ajtk+Xt+uRKGQ:h
Yara
  • infoStealer_browser_b_Zero - browser info stealer
VirusTotal Search for analysis
Name 94c25d74a2895ca9_kuoiaipimsdl31f.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\kuOIAIpimsDL31f.exe
Size 174.0KB
Processes 2688 (m1088338.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 675cce677311411a0f71b23487b1956c
SHA1 15cbbcbcf66dcf1ba5934077c39964bac2d486d1
SHA256 94c25d74a2895ca976b3687b5d89c807c6e0da782d6397e353cd75ea8b85e086
CRC32 E64202EA
ssdeep 3072:Vr28PMrO62MI02e6QcOrdxy3ZX95E0AyX/8MmbQSpxJh8e8hl:VK8PMMMI02e6Qa5E0WMmbQSpx3
Yara
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • MALWARE_Win_VT_RedLine - Detects RedLine infostealer
  • PE_Header_Zero - PE File Signature
  • Is_DotNET_EXE - (no description)
  • RedLine_Stealer_b_Zero - RedLine stealer
  • ConfuserEx_Zero - Confuser .NET
  • IsPE32 - (no description)
VirusTotal Search for analysis