Dropped Files | ZeroBOX
Name b7c225ef3cc3e875_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 2776 (powershell.exe)
Type data
MD5 81ca4510272caf505e8091e9a28cb716
SHA1 71414aeec9f1e4a6f5a461b01700cc9cc992cd9e
SHA256 b7c225ef3cc3e87506150eb140e7b9cc127a3469c50a808854acac71a53d98bf
CRC32 FC31E90F
ssdeep 96:EtuCcBGCPDXBqvsqvJCwoRtuCcBGCPDXBqvsEHyqvJCwor/47HwxGlUVul:EtCgXoRtCgbHnorLxY
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis
Name ca5bb640ad76de51_fyrkldre.sub
Submit file
Filepath C:\Users\test22\AppData\Roaming\Fyrkldre.sub
Size 414.2KB
Processes 2776 (powershell.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 89842396dc7325a0a8dd5c2d8fa917d9
SHA1 58d18b7a15a8eb0ac579ab67f2bb430b7ee0c453
SHA256 ca5bb640ad76de51059f8244f6f30d8cdddebacce6093ebb09cfcd8352ed6982
CRC32 FD71A4E5
ssdeep 12288:fK1cU30x4Q1IkboHinlv0LFt+exBtESzv:S1cUCx1Dnlv0Bt+eHlzv
Yara
  • Suspicious_Obfuscation_Script_2 - Suspicious obfuscation script (e.g. executable files)
VirusTotal Search for analysis