General
-
Target
fd70265ad37a25c349eb693197e1f48ac62b8566
-
Size
1.2MB
-
Sample
210909-qj3aesbdcj
-
MD5
b4c27f072271921d937b82f36b142426
-
SHA1
fd70265ad37a25c349eb693197e1f48ac62b8566
-
SHA256
c878e72b6b5be5ec505aaddf7811750533e3507505102dae09fe5f5a0c761bf4
-
SHA512
c594c36c61d0110266fbd5bffae70186ccc91262f618d0f6ad91476af17de4bc70a8d8187acccc6ae0db27351a483780e2a70a9e3fc8c43b5f9ef11bf83ba9cd
Static task
static1
Behavioral task
behavioral1
Sample
fd70265ad37a25c349eb693197e1f48ac62b8566.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
fd70265ad37a25c349eb693197e1f48ac62b8566.exe
Resource
win10-en
Malware Config
Extracted
matiex
https://api.telegram.org/bot1981462203:AAHe-qfJ-OUGrRMXEVqZGGP8SBSUyb-DHS4/sendMessage?chat_id=1875073748
Targets
-
-
Target
fd70265ad37a25c349eb693197e1f48ac62b8566
-
Size
1.2MB
-
MD5
b4c27f072271921d937b82f36b142426
-
SHA1
fd70265ad37a25c349eb693197e1f48ac62b8566
-
SHA256
c878e72b6b5be5ec505aaddf7811750533e3507505102dae09fe5f5a0c761bf4
-
SHA512
c594c36c61d0110266fbd5bffae70186ccc91262f618d0f6ad91476af17de4bc70a8d8187acccc6ae0db27351a483780e2a70a9e3fc8c43b5f9ef11bf83ba9cd
Score10/10-
Matiex Main Payload
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-