top title background image
flash

C&F.exe

Status: finished
Submission Time: 2020-10-11 18:41:25 +02:00
Malicious
Phishing
Trojan
Spyware
Evader
HawkEye MailPassView Ramnit

Comments

Tags

  • exe

Details

  • Analysis ID:
    296318
  • API (Web) ID:
    487752
  • Analysis Started:
    2020-10-11 18:41:26 +02:00
  • Analysis Finished:
    2020-10-11 18:55:40 +02:00
  • MD5:
    67633b0950101ba4edc4c7d3559820a7
  • SHA1:
    8d5ddb0f3cce4f300b4c2812211170ad7c7bc5e5
  • SHA256:
    aff4e29973c297fd764b3ba81237afd91912f51f9a4babfd766ce80f9ace2676
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 34/38
malicious
Score: 47/48
malicious

IPs

IP Country Detection
54.39.139.67
Canada
66.171.248.178
United States

Domains

Name IP Detection
mail.eagleeyeapparels.com
0.0.0.0
194.167.4.0.in-addr.arpa
0.0.0.0
bot.whatismyipaddress.com
66.171.248.178
Click to see the 1 hidden entries
eagleeyeapparels.com
54.39.139.67

URLs

Name Detection
http://www.msn.com/?ocid=iehpLMEMh
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=57232382215
http://pomf.cat/upload.phpCContent-Disposition:
Click to see the 15 hidden entries
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=5657692
http://bot.whatismyipaddress.com/
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1res://C:
http://www.nirsoft.net/
http://www.nirsoft.net
http://bot.whatismyipaddress.com
http://www.msn.com/de-ch/?ocid=iehpLMEMp
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542117
http://pomf.cat/upload.php
http://bot.whatismyipaddress.comx&.q
https://sectigo.com/CPS0
https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
http://pomf.cat/upload.php&https://a.pomf.cat/
https://go.microsoft.
https://a.pomf.cat/

Dropped files

Name File Type Hashes Detection
C:\Users\user\Desktop\C&Fmgr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\850d3f5b-a15a-4fcc-964e-bdae260451a6
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\tmpD4D2.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#
Click to see the 1 hidden entries
C:\Users\user\AppData\Local\Temp\~TMB479.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
#