Dropped Burrfers | ZeroBOX
Name b5663a6de922a164c59a72d1573d3ffee5f53221
Size 4.0KB
Type data
MD5 1d9c0458632b2bec62c0e9ce3302e10b
SHA1 b5663a6de922a164c59a72d1573d3ffee5f53221
SHA256 4d3d74f57de680e91fc4c7426b12aaa0f7d34d30a078a81b4df862023aa88d84
CRC32 BD045F31
ssdeep 48:pso/gNH3nl3FVrhoXb1BQFz7LTrLmUwcchm0TyK:pso4znrScvLTGPhn
Yara None matched
VirusTotal Search for analysis
Name 56e6e9685b2d971f6cbfb7ffbfa3f375ea228719
Size 4.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 17684413f28f5984f109f9b8780271cd
SHA1 56e6e9685b2d971f6cbfb7ffbfa3f375ea228719
SHA256 a31b4597e614aa4e8ccd6443746c1104cfdca4626cfd211c04674e52da26e654
CRC32 C9CFF532
ssdeep 12:eVGSG2uuj7NEO/QdRPxEUn0O84SSPKiEX2+l:eVGS7jZEO0n0XueG
Yara
  • PE_Header_Zero - PE File Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsBeyondImageSize - Data Beyond ImageSize Check
  • HasRichSignature - Rich Signature Check
VirusTotal Search for analysis
Name 80e317b5ca03777649195d95f941238994164226
Size 4.0KB
Type data
MD5 d70632f617cf1dea4fb88cfa0eac472f
SHA1 80e317b5ca03777649195d95f941238994164226
SHA256 912b013a39d2be85a75e997544c9f284ede2e9289b563657f4f9a0bfdd6a8857
CRC32 B83FBF18
ssdeep 12:csYYH1o/nB3i0fyya9ClKrllSkWG8m/lvuM:c81aNfg4i/SkWT0vu
Yara None matched
VirusTotal Search for analysis
Name 4fd6509bc87ed01c5074685252724b36ee766665
Size 12.0KB
Type data
MD5 70258d7fd52528e4cf49661d53f3b997
SHA1 4fd6509bc87ed01c5074685252724b36ee766665
SHA256 bc391300dd2ee8973c923d5e6fa77fd395b6088c0806b4fefea89f839f964a77
CRC32 5ACA46BE
ssdeep 192:iycn325n1akTGZl/l85VL7NgSWWDZ0H6/xPE1MrMW:iyc325n1akyZ5lQLJ2WDXJP1rP
Yara None matched
VirusTotal Search for analysis
Name ea6b0ce35de2773523bcbcb89cd3c74ff45e6d94
Size 80.0KB
Type data
MD5 d03abacfd248c4fbbf234674c35b05b4
SHA1 ea6b0ce35de2773523bcbcb89cd3c74ff45e6d94
SHA256 d746a8ea12cf694ade84b3685a154044c24bff6ddd959b6a48ca9752e987ecf7
CRC32 0936991F
ssdeep 1536:s4dVgM05zCiLdEUJg54ym+eaUnOabI/+8Z7k0qtBo7wvFvbOarlNEl26FH:s4XgM0gTUJNFbnOabI/JZ7k0qvo7wvdK
Yara None matched
VirusTotal Search for analysis
Name ec9c2c657916ca79a9ba8c2d9a5ab2ae6ccecaad
Size 24.0KB
Type data
MD5 c7283eead715ab71cce69af9a61507d0
SHA1 ec9c2c657916ca79a9ba8c2d9a5ab2ae6ccecaad
SHA256 2ecfd5cc1c649823848dfd7e2754b373d5a6173450f45580d0a5b3e39b96a004
CRC32 1EFB51D2
ssdeep 384:xUtUPB6B9u/0AhJK5VUf+6hOtzCFczqIT0YcRreZwq:xUaEu/3JkOfpmrzq9hRreZL
Yara
  • inject_thread - Code injection with CreateRemoteThread in a remote process
  • network_dropper - File downloader/dropper
  • escalate_priv - Escalade priviledges
  • keylogger - Run a keylogger
  • sniff_audio - Record Audio
  • cred_ff - Steal Firefox credential
  • win_mutex - Create or check mutex
  • win_registry - Affect system registries
  • win_token - Affect system token
  • win_files_operation - Affect private profile
  • Str_Win32_Winsock2_Library - Match Winsock 2 API library declaration
  • Str_Win32_Wininet_Library - Match Windows Inet API library declaration
  • Str_Win32_Internet_API - Match Windows Inet API call
VirusTotal Search for analysis