Dropped Files | ZeroBOX
Name b7c225ef3cc3e875_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2960 (Powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 33170390bddb29dc_output.js
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\Output.js
Size 484.5KB
Processes 2556 (wscript.exe)
Type ASCII text, with very long lines, with CRLF line terminators
MD5 183b67bb3bced4ef59e57cfbfff3d08e
SHA1 f79fe87e3c5f331895db528dd7beef8b5477187a
SHA256 33170390bddb29dc3b25b4301982f88451c1cdff4415f98050a470c7f6d31f32
CRC32 816A4868
ssdeep 12288:WVIb2+HFJWZqUZqHwOE7gPGBw9vvhw657e+hu21Ap7x4UHD:Wq2M4HYH0oGevmsWx
Yara
  • Suspicious_Obfuscation_Script_2 - Suspicious obfuscation script (e.g. executable files)
  • hide_executable_file - Hide executable file
VirusTotal Search for analysis
Name 1fd86142972ca45a_vob.exe
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\vOb.exe
Size 346.5KB
Processes 2684 (wscript.exe)
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 84c9943b3b720f2090e42202d733ff5b
SHA1 da75a570bdceaa6eeb9beb3cf1a2a2a334265349
SHA256 1fd86142972ca45a894e5bae8f464164d521694d7a65e3e28d59be74ba6d5166
CRC32 55A65A98
ssdeep 6144:gOgpaBWaBWVLlYueznULjUKK3PWdcQ9WjWgCT3JdTHQFxlTfK7GIoazcNsq:gOgpaBWaBmLavPKK3PDYq65drQrljK7k
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Is_DotNET_EXE - (no description)
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis