Dropped Burrfers | ZeroBOX
Name 8689d91905e94521b9a672eb161ea89993ff4797
Size 4.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7a33b95adea10f340a263313b181d4fb
SHA1 8689d91905e94521b9a672eb161ea89993ff4797
SHA256 ccc1431213c9c719e987b3ef8f932b719b993aa86126e59da2eaa705588d7b5a
CRC32 5A4E3448
ssdeep 12:eVGSG2uuj7NEO/QdRPxEckn0O84SSPCEX2+l:eVGS7jZEO8kn0Xu1G
Yara
  • PE_Header_Zero - PE File Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsBeyondImageSize - Data Beyond ImageSize Check
  • HasRichSignature - Rich Signature Check
VirusTotal Search for analysis
Name 97e41c42ebb674aff158a78e4b08e548315d74fa
Size 4.0KB
Type data
MD5 962e522ed00754ae441c768a130e0b2a
SHA1 97e41c42ebb674aff158a78e4b08e548315d74fa
SHA256 986cbfbace87305f5a842a2c29e90099feac57aa74c496971b53a42e91b6fa66
CRC32 E4F07E1C
ssdeep 48:vso/gNH3nl3FVrhoXb1BQFz7LTrLmUwccIkf80H75RVYfbie:vso4znrScvLTGPIkZ3oie
Yara None matched
VirusTotal Search for analysis
Name 80e317b5ca03777649195d95f941238994164226
Size 4.0KB
Type data
MD5 d70632f617cf1dea4fb88cfa0eac472f
SHA1 80e317b5ca03777649195d95f941238994164226
SHA256 912b013a39d2be85a75e997544c9f284ede2e9289b563657f4f9a0bfdd6a8857
CRC32 B83FBF18
ssdeep 12:csYYH1o/nB3i0fyya9ClKrllSkWG8m/lvuM:c81aNfg4i/SkWT0vu
Yara None matched
VirusTotal Search for analysis
Name 4fd6509bc87ed01c5074685252724b36ee766665
Size 12.0KB
Type data
MD5 70258d7fd52528e4cf49661d53f3b997
SHA1 4fd6509bc87ed01c5074685252724b36ee766665
SHA256 bc391300dd2ee8973c923d5e6fa77fd395b6088c0806b4fefea89f839f964a77
CRC32 5ACA46BE
ssdeep 192:iycn325n1akTGZl/l85VL7NgSWWDZ0H6/xPE1MrMW:iyc325n1akyZ5lQLJ2WDXJP1rP
Yara None matched
VirusTotal Search for analysis
Name ea6b0ce35de2773523bcbcb89cd3c74ff45e6d94
Size 80.0KB
Type data
MD5 d03abacfd248c4fbbf234674c35b05b4
SHA1 ea6b0ce35de2773523bcbcb89cd3c74ff45e6d94
SHA256 d746a8ea12cf694ade84b3685a154044c24bff6ddd959b6a48ca9752e987ecf7
CRC32 0936991F
ssdeep 1536:s4dVgM05zCiLdEUJg54ym+eaUnOabI/+8Z7k0qtBo7wvFvbOarlNEl26FH:s4XgM0gTUJNFbnOabI/JZ7k0qvo7wvdK
Yara None matched
VirusTotal Search for analysis
Name ec9c2c657916ca79a9ba8c2d9a5ab2ae6ccecaad
Size 24.0KB
Type data
MD5 c7283eead715ab71cce69af9a61507d0
SHA1 ec9c2c657916ca79a9ba8c2d9a5ab2ae6ccecaad
SHA256 2ecfd5cc1c649823848dfd7e2754b373d5a6173450f45580d0a5b3e39b96a004
CRC32 1EFB51D2
ssdeep 384:xUtUPB6B9u/0AhJK5VUf+6hOtzCFczqIT0YcRreZwq:xUaEu/3JkOfpmrzq9hRreZL
Yara
  • inject_thread - Code injection with CreateRemoteThread in a remote process
  • network_dropper - File downloader/dropper
  • escalate_priv - Escalade priviledges
  • keylogger - Run a keylogger
  • sniff_audio - Record Audio
  • cred_ff - Steal Firefox credential
  • win_mutex - Create or check mutex
  • win_registry - Affect system registries
  • win_token - Affect system token
  • win_files_operation - Affect private profile
  • Str_Win32_Winsock2_Library - Match Winsock 2 API library declaration
  • Str_Win32_Wininet_Library - Match Windows Inet API library declaration
  • Str_Win32_Internet_API - Match Windows Inet API call
VirusTotal Search for analysis