General
-
Target
QYD Quotation 20210702.exe
-
Size
1.1MB
-
Sample
210722-cednkm438e
-
MD5
494fc5838b2ff1381ab5d806cf7820a2
-
SHA1
d7ec8bb026fe526535ed556936ec057409fb00fa
-
SHA256
e58284d351b21f134a31fdccd3e53f952133f671892da8a86347d7b930399f28
-
SHA512
1c18d8524f0aecd4b4dfb2518de69c94362c23c60b3bc2e7229e6b06a9ed6e559212d97f740f4675c028cc5c5f9ab12b51d21589a42656232e207d2866120821
Static task
static1
Behavioral task
behavioral1
Sample
QYD Quotation 20210702.exe
Resource
win7v20210410
Malware Config
Extracted
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Extracted
matiex
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Targets
-
-
Target
QYD Quotation 20210702.exe
-
Size
1.1MB
-
MD5
494fc5838b2ff1381ab5d806cf7820a2
-
SHA1
d7ec8bb026fe526535ed556936ec057409fb00fa
-
SHA256
e58284d351b21f134a31fdccd3e53f952133f671892da8a86347d7b930399f28
-
SHA512
1c18d8524f0aecd4b4dfb2518de69c94362c23c60b3bc2e7229e6b06a9ed6e559212d97f740f4675c028cc5c5f9ab12b51d21589a42656232e207d2866120821
-
Matiex Main Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-