flash

SQ-DOC-78608244-20190005.7z.zip

Status: finished
Submission Time: 11.03.2020 04:25:52
Malicious
Phishing
Trojan
Spyware
Evader
HawkEye

Comments

Tags

Details

  • Analysis ID:
    214494
  • API (Web) ID:
    326065
  • Analysis Started:
    11.03.2020 04:25:53
  • Analysis Finished:
    11.03.2020 04:39:51
  • MD5:
    6b66ebf612f47a4233d526777e3f2484
  • SHA1:
    ad3ed97f059fb44a9d2af803399cae5db3fe746f
  • SHA256:
    7ad1a7a8ff24dfaf5d720447c7800546e0f9e4b99ff6f58c4da6743029ec8c3e
  • Technologies:
Full Report Engine Info Verdict Score Reports

System: w10x64 Windows 10 64 bit v1803 with Office Professional Plus 2016, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
26/73

malicious
19/45

malicious

URLs

Name Detection
https://a.pomf.cat/
https://login.yahoo.com/config/login
http://pomf.cat/upload.php&https://a.pomf.cat/
Click to see the 6 hidden entries
https://go.microsoft.D
http://www.nirsoft.net
http://pomf.cat/upload.php
http://www.nirsoft.net/
http://bot.whatismyipaddress.com/
http://pomf.cat/upload.phpCContent-Disposition:

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\ibaufc5p.ayj\SQ-DOC-78608244-20190005.pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\unarchiver.exe.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\4sg3jcey.hil\unarchiver.log
ASCII text, with CRLF line terminators
#
Click to see the 5 hidden entries
C:\Users\user\AppData\Local\Temp\8fa38558-5c9d-7b4f-c5fa-3b72555221e0
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\ik3tcyzc.jme\SQ-DOC-78608244-20190005.7z
RAR archive data, v5
#
C:\Users\user\AppData\Local\Temp\jq15gcxe.on4\unarchiver.log
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Temp\tmp9663.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\tmpAFDF.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#