Dropped Files | ZeroBOX
Name ac59b5972b545bb8_9n3sl7qg3mvcw8u.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\9N3sL7QG3mvcw8U.exe
Size 276.5KB
Processes 2372 (m5507002.exe)
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 29db7da09339406d1ef617ab72518d77
SHA1 4be876f0d332999ebf6ecaf8382301de522fdcd7
SHA256 ac59b5972b545bb82be6cb60cdacc2a9be754da35832b0531f6461071dd9b382
CRC32 E234CD74
ssdeep 6144:xJd14+ndOfMfnuisXksZH5uRvtjmAOWoWMExeIx6Puz:xJ84kfMfnuis006jmLuxeIx6W
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name d187f883ef0183c7_y5477514.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP000.TMP\y5477514.exe
Size 272.0KB
Processes 2172 (AppLaunch.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 e27ba03a50bc0355646b7209cbd5c506
SHA1 bb6ea11a4e52960b2cc08dd0a190725a0afd5659
SHA256 d187f883ef0183c73668d93319235737aa4af6824b67a911c7e38dce4456a62d
CRC32 7381046A
ssdeep 6144:KOy+bnr+2p0yN90QEtdTwoe7P0PF+BRcO28J+tIOv:yMrSy90tw9L0iRck4SQ
Yara
  • Malicious_Library_Zero - Malicious_Library
  • CAB_file_format - CAB archive file
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_Gen_1_0904B0_Zero - Win32 Trojan Emotet
  • Win32_Trojan_Emotet_RL_Gen_Zero - Win32 Trojan Emotet
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name 639be2da22501efa_4375vtb45tv8225nv4285n2.txt
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\4375vtb45tv8225nv4285n2.txt
Size 221.0B
Processes 2372 (m5507002.exe) 496 (AppLaunch.exe)
Type ASCII text
MD5 96828dd888b4e629258bc9bb2e64e263
SHA1 41ad02e645730e2ad2cdfb7d19a25896febb1651
SHA256 639be2da22501efaa327c5d4eed531a6b1279059340d3fb354d36db390dbef4c
CRC32 AFF4D175
ssdeep 6:kCFGLGKvVGGi+y20LNWIAjJzMFaqyLVG4:kCFGLGKHiLzB4JgcBT
Yara None matched
VirusTotal Search for analysis
Name 5dc6c9cac1242613_6rvkpnetfwtuxfy.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\6rVkpNETfwTuXfY.exe
Size 174.0KB
Processes 2372 (m5507002.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 bb4a547bedfa91cedefebba89a42757a
SHA1 610de690db862a7153ceb9f292e981606595bd09
SHA256 5dc6c9cac124261348c748f6f869474efbec9b6ea55c6b9746c208ca64517865
CRC32 691B5C0A
ssdeep 3072:9C0CdpuI0Ti2228OuI6VGOnDrE08Bins/rpfrJP8e8h6:9CXuI0Ti222DODrE0Md/rpfr5
Yara
  • UPX_Zero - UPX packed file
  • MALWARE_Win_VT_RedLine - Detects RedLine infostealer
  • PE_Header_Zero - PE File Signature
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Is_DotNET_EXE - (no description)
  • RedLine_Stealer_b_Zero - RedLine stealer
  • ConfuserEx_Zero - Confuser .NET
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name e16c248813625f6e_o4696120.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\IXP000.TMP\o4696120.exe
Size 386.5KB
Processes 2172 (AppLaunch.exe)
Type PE32 executable (console) Intel 80386, for MS Windows
MD5 26614ad63a638825b9a4a072989d6f8d
SHA1 464bc44c62f32b6234c7539dceb399be14fe945f
SHA256 e16c248813625f6edd9d78b946c35469b0d0fa7d88d9b5f3b43f207f0183033d
CRC32 43A95570
ssdeep 6144:HJd14QcdOfMfnuisXksZH5uRvtjmAOKoWsMmghh5ThE5ZLmtMPRQSOuz:HJ8NkfMfnuis006jmfFffuSL
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis