Dropped Files | ZeroBOX
Name 67e5abf70156aafd_agenda.cab
Submit file
Filepath C:\Users\Public\agenda.cab
Size 79.2KB
Processes 1228 (powershell.exe)
Type ASCII text, with very long lines, with no line terminators
MD5 f5a3839e6dc06e35c8c05dc80cbedeac
SHA1 a5feda72e2e71450392fecfa68a6bed4fbcb55fd
SHA256 67e5abf70156aafdfe1ef766e5e89b5a4ca6f46a33114d742c8a6f11180c4d1d
CRC32 29A246A8
ssdeep 3:XdVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVf:P
Yara
  • Suspicious_Obfuscation_Script_2 - Suspicious obfuscation script (e.g. executable files)
VirusTotal Search for analysis
Name a9b1dc8eaa5fcd00_d93f411851d7c929.customdestinations-ms
Submit file
Filepath c:\users\test22\appdata\roaming\microsoft\windows\recent\customdestinations\d93f411851d7c929.customdestinations-ms
Size 7.8KB
Processes 1228 (powershell.exe)
Type data
MD5 c1d8708bab1e838a2deda26d58bb8d42
SHA1 95d39e75a804752961c139bb6c0b67f84f685035
SHA256 a9b1dc8eaa5fcd0034694cf9742ae915a5932142a1477c3ab6fada45d98750b2
CRC32 E71AF2A2
ssdeep 96:QtuC6GCPDXBqvsqvJCwoFtuC6GCPDXBqvsEHyqvJCworFS7HwxWlUVul:QtbXoFtbbHnor/xo
Yara
  • Antivirus - Contains references to security software
  • Generic_Malware_Zero - Generic Malware
VirusTotal Search for analysis