General
-
Target
Required Order Details 0099299.exe
-
Size
1.1MB
-
Sample
210724-9fp1yzvrfa
-
MD5
3bcae8c41a076a0803c99fea75f2aa87
-
SHA1
f2c1b01afcc3a3af6d947b39419bb4531daa8945
-
SHA256
42ff1648e53d0054bc7c4a5c8a5db648c2a3405415d441c7d5801e52f56bf7a7
-
SHA512
220880b1422811db1d9cd79030ea8005a7921ecabb580a3ed537d68bb068005f98b14a87e1f90f796d0d506ccd37675c9153a84e2ea0096bc45d55534f5e4113
Static task
static1
Behavioral task
behavioral1
Sample
Required Order Details 0099299.exe
Resource
win7v20210410
Malware Config
Extracted
matiex
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Extracted
Protocol: smtp- Host:
mail.thts.vn - Port:
25 - Username:
[email protected] - Password:
123luongngan1989
Targets
-
-
Target
Required Order Details 0099299.exe
-
Size
1.1MB
-
MD5
3bcae8c41a076a0803c99fea75f2aa87
-
SHA1
f2c1b01afcc3a3af6d947b39419bb4531daa8945
-
SHA256
42ff1648e53d0054bc7c4a5c8a5db648c2a3405415d441c7d5801e52f56bf7a7
-
SHA512
220880b1422811db1d9cd79030ea8005a7921ecabb580a3ed537d68bb068005f98b14a87e1f90f796d0d506ccd37675c9153a84e2ea0096bc45d55534f5e4113
-
Matiex Main Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-