flash

TrxPoXd5QM.exe

Status: finished
Submission Time: 17.11.2020 12:20:42
Malicious
Phishing
Trojan
Spyware
Evader
HawkEye MailPassView

Comments

Tags

  • HawkEye

Details

  • Analysis ID:
    318753
  • API (Web) ID:
    539312
  • Analysis Started:
    17.11.2020 12:20:43
  • Analysis Finished:
    17.11.2020 12:33:43
  • MD5:
    d660df79103de250e65f36f885d7e91e
  • SHA1:
    8cf785c953cd751eae17f3a58216faa24d8cabae
  • SHA256:
    a1416f15382642c1bcf6fafac052bcd38900409be007f54414942e405c18ff73
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
100/100

malicious
16/37

malicious
23/29

malicious

URLs

Name Detection
https://a.pomf.cat/
https://login.yahoo.com/config/login
http://pomf.cat/upload.php&https://a.pomf.cat/
Click to see the 7 hidden entries
http://www.msn.com/?ocid=iehpLMEM
http://www.nirsoft.net
http://pomf.cat/upload.php
http://www.nirsoft.net/
http://www.msn.com/de-ch/?ocid=iehpLMEMh
http://bot.whatismyipaddress.com/
http://pomf.cat/upload.phpCContent-Disposition:

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winrshost.url
MS Windows 95 Internet shortcut text (URL=<file:///C:/Users/user/winrshost/winrshost.vbs>), ASCII text, with CR line terminators
#
C:\Users\user\winrshost\adsmsext.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Temp\6cfa0008-0a59-f600-37be-9b0ca3620d36
ASCII text, with no line terminators
#
Click to see the 3 hidden entries
C:\Users\user\AppData\Local\Temp\tmp543C.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\AppData\Local\Temp\tmpAF61.tmp
Little-endian UTF-16 Unicode text, with no line terminators
#
C:\Users\user\winrshost\winrshost.vbs
ASCII text, with CRLF line terminators
#