Dropped Files | ZeroBOX
Name a2ce3a0fa7d2a833_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 893.0B
Processes 2564 (RBY2.exe)
Type data
MD5 d4ae187b4574036c2d76b6df8a8c1a30
SHA1 b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256 a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
CRC32 1C31685D
ssdeep 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
Yara None matched
VirusTotal Search for analysis
Name c353fb081ae8e121_brzgjueynyj5d5vypdkt21cl.exe
Submit file
Filepath C:\Users\test22\AppData\Local\brzGjuEYnYJ5D5vypdkt21Cl.exe
Size 4.1MB
Processes 2564 (RBY2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 3ee6cdfcb4b8304ce79954bc198f8de7
SHA1 ed59d06f8d34e351efad65a72cfa52aa489c4aa9
SHA256 c353fb081ae8e121c4dcea3ad1bc4061315728a6f0d0ac63885a4f074be5fef3
CRC32 3CEEAB85
ssdeep 98304:yLyb54rAVQD2esiID+dc0iOuFInEXs7kxS8It7QwMthknMlWS:y054wQD2znD21nu21kkMlT
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 0673d684ef903a2d_wnwovrigq6vd753ctxlkrsiq.bat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wnwOvRigq6vd753CtxlKRsIq.bat
Size 70.0B
Processes 2564 (RBY2.exe)
Type ASCII text, with no line terminators
MD5 eeedd10272fbcbc9133f3f869eb3d589
SHA1 61ea18efe8d42251417e12a651d5b6820e965e0a
SHA256 0673d684ef903a2df3bae6a471ccfc4c369feca190782998d7683cb3bfddab55
CRC32 20240497
ssdeep 3:Ljn9m1mWxpcL4E2J5Mpjz8Gi59poLPL:fE1mQpcLJ23MFQGiC3
Yara None matched
VirusTotal Search for analysis
Name 0dd90d1a08b1d2e0_whobwdbzfdvtf0qc8gpa5jys.bat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wHoBwdBzfDVtf0qc8GPa5JYS.bat
Size 70.0B
Processes 2564 (RBY2.exe)
Type ASCII text, with no line terminators
MD5 0338e2051f7724e6e8edfc697028c8ca
SHA1 2692d40cedd37c4ef340cfbfd24f5f0a25915b19
SHA256 0dd90d1a08b1d2e05728436172da6010089e3f43d20a48658f1c361c0812a491
CRC32 4D272DA1
ssdeep 3:Ljn9m1mWxpcL4E2J5cvlrdL6PF:fE1mQpcLJ23cvqPF
Yara None matched
VirusTotal Search for analysis
Name c7ca5fa4c6660950_qfijjchq1ovq2fniolytjpvc.bat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QFIjjcHQ1ovQ2FNiOlYtJpvC.bat
Size 70.0B
Processes 2564 (RBY2.exe)
Type ASCII text, with no line terminators
MD5 e9cf0eac75b549cab040a483fa913687
SHA1 fc7bf92a337c5a4adf1051235f3f6e775f1f77c7
SHA256 c7ca5fa4c6660950724eb35e8b886b2f828a7e709280d33b0d3770fc86db8705
CRC32 6639F2C1
ssdeep 3:Ljn9m1mWxpcL4E2J5HPiog3vQhhcNvn:fE1mQpcLJ23viogf0hcNv
Yara None matched
VirusTotal Search for analysis
Name 5352932204d2a0f2_e0f5c59f9fa661f6f4c50b87fef3a15a
Submit file
Filepath C:\Users\test22\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Size 252.0B
Processes 2564 (RBY2.exe)
Type data
MD5 5b30740a355fdb9a26e963cac999261e
SHA1 b25a85d3152aa97cb8f2a876160be9df7c3a6471
SHA256 5352932204d2a0f24c4aafffe232658f5a2eaa22edec17586667043aa4dbd48e
CRC32 F38A0CF2
ssdeep 3:kkFklXP13lXfllXlE/E/KRkzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB8V7l3:kKGlxliBAIdQZV7I7kc3
Yara None matched
VirusTotal Search for analysis
Name 635368a5852b427c_gxtkodm8juimvkinocmwhkzr.bat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gxtkOdm8JuIMvKINocMwHKZR.bat
Size 91.0B
Processes 2564 (RBY2.exe)
Type ASCII text, with no line terminators
MD5 5dad93c55700cf422a95b4850004f33b
SHA1 9cc90687c080bad0cf313ade9124c203c8842faa
SHA256 635368a5852b427c93d46cd36789ac2f06726be3c1f0b4c67944c39c5c486509
CRC32 A69A074E
ssdeep 3:Ljn9m1mWxpcL4E2J5rkGbgkdan:fE1mQpcLJ234igD
Yara None matched
VirusTotal Search for analysis
Name ecaf274f75637736_nvnqxwp3cm1i11cwsqyalqvf.exe
Submit file
Filepath C:\Users\test22\AppData\Local\NvnqxWp3Cm1i11cWSqYaLQvf.exe
Size 2.8MB
Processes 2564 (RBY2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5 d6e3673b1f679c7e27f602e50c1949fe
SHA1 1c092a440b138c4f0eeb58307ca5c516c9759db1
SHA256 ecaf274f7563773623cca1168598fefe108836a0f87316007ad603cf61597f79
CRC32 FE0137DB
ssdeep 49152:kkWRuBGKpC4Ao3GB1T2UpIMFHyn+pVboenz0YLUbT+IIgVI165oPTmEsgrDepkAx:ORKf8uGB1T9q+vk8z0YLngmM+PSRg3eJ
Yara
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name b2bc36331e8a19de_832866432405
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\832866432405
Size 23.5KB
Processes 1576 (nhdues.exe)
Type JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1024x768, frames 3
MD5 0770f4aed5191fec164b6733279d75a7
SHA1 1f950f7113f9aeadaceeea16201e307fc5b4ebbc
SHA256 b2bc36331e8a19de2548ee10353356d4f3b1f3eaaaf00c6cf56312c70d440613
CRC32 A948C5F9
ssdeep 384:0JaiPMg0xcjrvvvvvvvvvvvvvvvusXdMVtVSPiIku:0AbLxCrvvvvvvvvvvvvvvvIVWJ
Yara
  • JPEG_Format_Zero - JPEG Format
VirusTotal Search for analysis
Name 2f7174e4db37dc51_Opera_installer_2310160416561562552.dll
Submit file
Filepath C:\Users\test22\Pictures\Opera_installer_2310160416561562552.dll
Size 4.7MB
Processes 2552 (vREToto7AIJ9nFpi93ZHsPlH.exe)
Type PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5 9e0d1f5e1b19e6f5c5041e6228185374
SHA1 5abc65f947c88a51949707cf3dd44826d3877f4e
SHA256 2f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
CRC32 9C970310
ssdeep 98304:56666666666666666666666666666666x666666666666666fwwwwwwwwwwwwwwE:DsLzKtOa6g5k5yLUGm13lBf/JK5GaShP
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)
  • Antivirus - Contains references to security software
  • OS_Processor_Check_Zero - OS Processor Check
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 710a3e1beda67e1c_yyyihm1mswpbfkb5xs6i62oe.exe
Submit file
Filepath C:\Users\test22\AppData\Local\yyyIHm1msWpbfkB5Xs6I62Oe.exe
Size 5.2MB
Processes 2564 (RBY2.exe)
Type PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
MD5 df280925e135481b26e921dd1221e359
SHA1 877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256 710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
CRC32 184C99A5
ssdeep 98304:Po/+yDDRT0Vzalb9K8K+ZR+wc6cw5FTEsDNJZe6w43eK:A/+yHxlb9K8K+rYq9NJZeD43eK
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE64 - (no description)
VirusTotal Search for analysis
Name d9131553ec533752_90jp43fgzn2waaodnerxpwdw.exe
Submit file
Filepath C:\Users\test22\AppData\Local\90Jp43fGzN2wAaoDneRxPWDw.exe
Size 226.0KB
Processes 2564 (RBY2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 aebaf57299cd368f842cfa98f3b1658c
SHA1 cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256 d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
CRC32 ACEB78BF
ssdeep 6144:k5tErvkeLE0X7J7bhi1g6FKVu+dnX9ys8l+:CYkeg0Nbh6FKu+dnX
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • Malicious_Packer_Zero - Malicious Packer
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 78f00b319619d905_rj3ngzseegowpbct0v2u8e0k.exe
Submit file
Filepath C:\Users\test22\AppData\Local\RJ3NgZSEeGowPBct0V2u8e0k.exe
Size 327.0KB
Processes 2564 (RBY2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f6d470bdfc5dd8dd800580cfa71d1837
SHA1 7246b909e88e298c212e4b5deba088a8f7cd2f48
SHA256 78f00b319619d905b5065b38e6977c4432729a2eb1eecc81898219016c7687d7
CRC32 20F11296
ssdeep 3072:oBhhu7Hp+Bge8NISny9qPWXwGeZjuFTL1dssEMShxdlyJOVFGe3sjz8vwyDTQDbu:ahsgBge+PWXwGJP1OBo4h3GzisXqKq
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name bb902a1f9f78f095_ner8cpitg1q3d23l524ffy12.bat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NeR8cpItg1Q3D23L524Ffy12.bat
Size 70.0B
Processes 2564 (RBY2.exe)
Type ASCII text, with no line terminators
MD5 eaaec3feef1ec6ffc2780aeaf3bf00bd
SHA1 cf3a02544ebf967388ce4d803df79eb191ff0c5f
SHA256 bb902a1f9f78f095cd758c81f5a7c26fd51aec458a5acc0830de67e988ac9152
CRC32 48256702
ssdeep 3:Ljn9m1mWxpcL4E2J53igA8tGZAJLv:fE1mQpcLJ23SDuLv
Yara None matched
VirusTotal Search for analysis
Name e4a2b53965b9d203_j9bhd7gzkn6zljkg3sqci0ck.exe
Submit file
Filepath C:\Users\test22\Pictures\j9BhD7GZkN6ZLJkG3SQci0cK.exe
Size 4.1MB
Processes 2564 (RBY2.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f8c080b6120c8ad51706a87a197f3a96
SHA1 11963758b724ef55789b5a4e2407d4afbb43ee90
SHA256 e4a2b53965b9d203d13dd4b5962b9f07270bb87e5738f44cf1126ce36019427d
CRC32 E0C923A1
ssdeep 98304:SLyb54rAVQD2esiID+dc0iOuFInEXs7kxS8It7QwMthknMlWs:S054wQD2znD21nu21kkMlB
Yara
  • Malicious_Library_Zero - Malicious_Library
  • UPX_Zero - UPX packed file
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • OS_Processor_Check_Zero - OS Processor Check
VirusTotal Search for analysis
Name 0660ee466b7149d9_w2n23bnbwjl8vhfkeqe2y20l.bat
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\w2N23bNbwJl8vhfKeQE2y20l.bat
Size 70.0B
Processes 2564 (RBY2.exe)
Type ASCII text, with no line terminators
MD5 72aa4e37ab436b7a579b1f01213de4bb
SHA1 a8266deb7f2333f149a1ac202004fa1afe1b8b16
SHA256 0660ee466b7149d97d51546527e833c590d660e21d1ab5224857c7370d65cd7b
CRC32 72E19D3C
ssdeep 3:Ljn9m1mWxpcL4E2J5cykuTsvLNln:fE1mQpcLJ23cMTsz
Yara None matched
VirusTotal Search for analysis