General
-
Target
6bda615aeae7d6bce3c88e371061e02d.exe
-
Size
1.5MB
-
Sample
210120-fhj75s92d6
-
MD5
6bda615aeae7d6bce3c88e371061e02d
-
SHA1
ef600fb48ea9c4b3f255903af9193d4efb872c5d
-
SHA256
03edcfce38fb8cb69241f2f363f075aa53de4cf325f7d953812fdc9d8f3b010a
-
SHA512
ecd2f495a59651c1678f2aab53b56e9b8be05f35081250b96d79a87870f70f46829beef0643370b3004f5aedd97adfcaecc1df54486b756184f5216d2c513b88
Static task
static1
Behavioral task
behavioral1
Sample
6bda615aeae7d6bce3c88e371061e02d.exe
Resource
win7v20201028
Malware Config
Extracted
matiex
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
info@bilgitekdagitim.com - Password:
italik2015
Targets
-
-
Target
6bda615aeae7d6bce3c88e371061e02d.exe
-
Size
1.5MB
-
MD5
6bda615aeae7d6bce3c88e371061e02d
-
SHA1
ef600fb48ea9c4b3f255903af9193d4efb872c5d
-
SHA256
03edcfce38fb8cb69241f2f363f075aa53de4cf325f7d953812fdc9d8f3b010a
-
SHA512
ecd2f495a59651c1678f2aab53b56e9b8be05f35081250b96d79a87870f70f46829beef0643370b3004f5aedd97adfcaecc1df54486b756184f5216d2c513b88
-
Matiex Main Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-