General
-
Target
0ab719d058f5cccd970f2f06c5ff4647.exe
-
Size
566KB
-
Sample
210113-2ae8ge6dnn
-
MD5
0ab719d058f5cccd970f2f06c5ff4647
-
SHA1
4a1b7539377b2631cba14f37ff056e60504bc828
-
SHA256
8479d4212bcb6f0673481044711acebfa1fce4e52799275930502860c6cca6f4
-
SHA512
6e0d33dd230f849ef32c04b0c10c99726a1b564a154fa105d409a5e12a04f6f86010bb42f66ce4b5c666fb4330f3ad11354f78f45e0e38d3189998470b4bb9b0
Static task
static1
Behavioral task
behavioral1
Sample
0ab719d058f5cccd970f2f06c5ff4647.exe
Resource
win7v20201028
Malware Config
Extracted
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Extracted
matiex
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Targets
-
-
Target
0ab719d058f5cccd970f2f06c5ff4647.exe
-
Size
566KB
-
MD5
0ab719d058f5cccd970f2f06c5ff4647
-
SHA1
4a1b7539377b2631cba14f37ff056e60504bc828
-
SHA256
8479d4212bcb6f0673481044711acebfa1fce4e52799275930502860c6cca6f4
-
SHA512
6e0d33dd230f849ef32c04b0c10c99726a1b564a154fa105d409a5e12a04f6f86010bb42f66ce4b5c666fb4330f3ad11354f78f45e0e38d3189998470b4bb9b0
-
Matiex Main Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-