top title background image
flash

RQF.exe

Status: finished
Submission Time: 2020-10-08 15:28:31 +02:00
Malicious
Phishing
Trojan
Spyware
Evader
HawkEye MailPassView

Comments

Tags

  • exe

Details

  • Analysis ID:
    295325
  • API (Web) ID:
    485540
  • Analysis Started:
    2020-10-08 18:44:09 +02:00
  • Analysis Finished:
    2020-10-08 18:58:50 +02:00
  • MD5:
    640e96c610bb396933412f55a0e046d6
  • SHA1:
    85b93904804752a3b88ead49058207b66dd67ec8
  • SHA256:
    c944ec2c1c332672384769d2abfbb4f298f9fcaa63b18b4094e1d9779fa82fe0
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 33/70
malicious
Score: 21/48
malicious

IPs

IP Country Detection
54.39.139.67
Canada
66.171.248.178
United States

Domains

Name IP Detection
eagleeyeapparels.com
54.39.139.67
51.143.5.0.in-addr.arpa
0.0.0.0
mail.eagleeyeapparels.com
0.0.0.0
Click to see the 1 hidden entries
bot.whatismyipaddress.com
66.171.248.178

URLs

Name Detection
https://contextual.media.net/checksync.phphttps://contextual.media.net/medianet.php?cid=8CU157172&cr
https://a.pomf.cat/
http://pomf.cat/upload.php&https://a.pomf.cat/
Click to see the 12 hidden entries
https://sectigo.com/CPS0
http://pomf.cat/upload.php
http://www.msn.com/de-ch/?ocid=iehpLMEMh
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
https://login.yahoo.com/config/login
http://bot.whatismyipaddress.com
http://www.nirsoft.net
http://www.nirsoft.net/
http://bot.whatismyipaddress.com/
http://bot.whatismyipaddress.comx&
http://pomf.cat/upload.phpCContent-Disposition:
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=8072167097284;g

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\701d94db-c899-585e-5907-ee05ac26af19
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\tmp6E6E.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#