flash

CF.exe

Status: finished
Submission Time: 12.10.2020 15:00:14
Malicious
Phishing
Trojan
Spyware
Evader
HawkEye MailPassView

Comments

Tags

  • exe

Details

  • Analysis ID:
    296647
  • API (Web) ID:
    488412
  • Analysis Started:
    12.10.2020 15:00:14
  • Analysis Finished:
    12.10.2020 15:10:57
  • MD5:
    2eedf37ed7d943d6a255912e7e14ae49
  • SHA1:
    b0cdfe5a254ef6d13e83461b6a04c91cc0c88d13
  • SHA256:
    44f88f1551622a78e7e0cb6cb04b810ce4c58a1dbd6039b1f7248b579e8f9095
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
41/70

malicious
30/48

malicious

IPs

IP Country Detection
54.39.139.67
Canada
66.171.248.178
United States

Domains

Name IP Detection
eagleeyeapparels.com
54.39.139.67
mail.eagleeyeapparels.com
0.0.0.0
220.240.8.0.in-addr.arpa
0.0.0.0
Click to see the 1 hidden entries
bot.whatismyipaddress.com
66.171.248.178

URLs

Name Detection
https://a.pomf.cat/
https://login.yahoo.com/config/login
http://pomf.cat/upload.php&https://a.pomf.cat/
Click to see the 8 hidden entries
https://sectigo.com/CPS0
http://bot.whatismyipaddress.com
http://www.nirsoft.net
http://pomf.cat/upload.php
http://www.nirsoft.net/
http://bot.whatismyipaddress.com/
http://bot.whatismyipaddress.comx&
http://pomf.cat/upload.phpCContent-Disposition:

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\01e864aa-fa9b-c261-ff81-b3cc7f79a6d3
ASCII text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\tmp25D5.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#