Dropped Files | ZeroBOX
Name 47dd0f275b04c35f_mlb_korean_job_description.pdf.lnk
Submit file
Filepath C:\Users\test22\AppData\Local\Temp\MLB_KOREAN_JOB_DESCRIPTION.pdf.lnk
Size 14.4KB
Processes 2552 (cmd.exe)
Type MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=2, ctime=Sun Dec 31 15:32:08 1600, mtime=Sun Dec 31 15:32:08 1600, atime=Sun Dec 31 15:32:08 1600, length=0, window=hide
MD5 a5d910f6757f0e944b6915acee898729
SHA1 fcbc92f4c45749ee53a69f05ea33c4701b7c6441
SHA256 47dd0f275b04c35fb38938f30fcccefefbe2a64f92b5f601c890a3cad324c14a
CRC32 E4785CB9
ssdeep 384:O6cXg9IS3LWovBBgkrXWzfMN5bt0GHI8kklOlmv:9MgPSop1rXWbOVOGTOY
Yara
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name b7c225ef3cc3e875_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2808 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis