General
-
Target
ad96a533b57aa554418f13e261262af9.exe
-
Size
566KB
-
Sample
210113-ve6d5fmjfx
-
MD5
ad96a533b57aa554418f13e261262af9
-
SHA1
3f3967cd227c4313ce254078e791f755340c65dc
-
SHA256
3a2802bd318aabf9c74b89c146f24bc95fafcde3356c66a7cc7b74241845a4d0
-
SHA512
c79f1da9a3b4044414fc7f479f9e3e27076c483b26d9eea85f1312160afd3dbe1e5fe8131ea07699366c87af98628ba797dbe1070ecade3760e990ac4a50b9ec
Static task
static1
Behavioral task
behavioral1
Sample
ad96a533b57aa554418f13e261262af9.exe
Resource
win7v20201028
Malware Config
Extracted
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Extracted
matiex
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Targets
-
-
Target
ad96a533b57aa554418f13e261262af9.exe
-
Size
566KB
-
MD5
ad96a533b57aa554418f13e261262af9
-
SHA1
3f3967cd227c4313ce254078e791f755340c65dc
-
SHA256
3a2802bd318aabf9c74b89c146f24bc95fafcde3356c66a7cc7b74241845a4d0
-
SHA512
c79f1da9a3b4044414fc7f479f9e3e27076c483b26d9eea85f1312160afd3dbe1e5fe8131ea07699366c87af98628ba797dbe1070ecade3760e990ac4a50b9ec
-
Matiex Main Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-