Dropped Files | ZeroBOX
Name 315aed19467e208f_agent.pyw - 바로 가기.lnk
Submit file
Size 515.0B
Type MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Aug 12 19:47:26 2020, mtime=Wed Aug 12 19:47:26 2020, atime=Thu Aug 6 20:00:12 2020, length=13462, window=hide
MD5 1ceedae65ed513f47cc844eabd36b118
SHA1 3b62d65bb806aca83415b080237621c73fae94e2
SHA256 315aed19467e208f39c9dc03ec29e205d782c7cb3697ff2bb0f58f35c9f4330b
CRC32 F6AF804F
ssdeep 6:4xtAlXBNqAEhMRyl//eTiApwzlDCGHWMb3DYy/tljAlPt4qMbEE8Cm/mZxdhbThF:8+JEhom/eXmJrbDrXjAoYEFbxTxh
Yara
  • lnk_file_format - Microsoft Windows Shortcut File Format
  • Lnk_Format_Zero - LNK Format
VirusTotal Search for analysis
Name 92a433340dd32cb3_svcsvc.exe
Submit file
Filepath C:\Users\test22\AppData\Local\svcsvc\svcsvc.exe
Size 4.7MB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 fea9e6588163a319883a3b4d9b1f48fe
SHA1 56365a251100676323840fa5dfdabaad99f2f772
SHA256 92a433340dd32cb379159432fbc26a6f2ca495ef97c31f7fd333913ced03d773
CRC32 8B3E4663
ssdeep 24576:MztFdtnYQb6VOFv1bdLOqGmXL4pu2OqfNoROKiuHym1fkBonH6X7GUAUTiS0YZRT:
Yara
  • PE_Header_Zero - PE File Signature
  • hide_executable_file - Hide executable file
  • anti_vm_detect - Possibly employs anti-virtualization techniques
  • Is_DotNET_EXE - (no description)
  • IsPE32 - (no description)
VirusTotal Search for analysis
Name b7c225ef3cc3e875_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2680 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name 2304f9b18cc90521_vm_setting.reg
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vm_setting.reg
Size 1.5KB
Type Windows Registry text (Win2K or above)
MD5 19c4bedc36624520504b8ecb0bdf1cbf
SHA1 1151f5b82fe80cd51e85318f21513dbeb17092eb
SHA256 2304f9b18cc905218cb9428e804839effef722aa18ea01ec11f95939343de9a0
CRC32 5F432191
ssdeep 48:9JDekafAKGw+DY+O+4kxEHTvbL1wbL6TKEwbL/TJE3bLZ:PZaf6h41Wd1S
Yara
  • anti_vm_detect - Possibly employs anti-virtualization techniques
VirusTotal Search for analysis
Name cdb11958506a5ba5_desktop.ini
Submit file
Filepath C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
Size 174.0B
Type Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
MD5 7f1698bab066b764a314a589d338daae
SHA1 524abe4db03afef220a2cc96bf0428fd1b704342
SHA256 cdb11958506a5ba5478e22ed472fa3ae422fe9916d674f290207e1fc29ae5a76
CRC32 D4B939D8
ssdeep 3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15lulATTM7lBlnJSl6W99:QyqRsioTA5wmHOlRaQmZWGokJqAMhAlL
Yara None matched
VirusTotal Search for analysis