General
-
Target
28f416d3d15990c1f3496f1f50e27430.exe
-
Size
851KB
-
Sample
210910-t9j4badeaq
-
MD5
28f416d3d15990c1f3496f1f50e27430
-
SHA1
f894aba5978f920d54d054add03f2e4b6e06b199
-
SHA256
d19dc1aef457a11c415d41b9bec1f6e7679b20aacc6771f789c66701be2d9a10
-
SHA512
aef4a944ad31362a50351b53b070219aa533bec721f536c13f77ccb244cc723946e4462a7a6e78a18c5ff433ed2969821979ca499eb60429e8a20ddc61b4c20d
Static task
static1
Behavioral task
behavioral1
Sample
28f416d3d15990c1f3496f1f50e27430.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
28f416d3d15990c1f3496f1f50e27430.exe
Resource
win10-en
Malware Config
Targets
-
-
Target
28f416d3d15990c1f3496f1f50e27430.exe
-
Size
851KB
-
MD5
28f416d3d15990c1f3496f1f50e27430
-
SHA1
f894aba5978f920d54d054add03f2e4b6e06b199
-
SHA256
d19dc1aef457a11c415d41b9bec1f6e7679b20aacc6771f789c66701be2d9a10
-
SHA512
aef4a944ad31362a50351b53b070219aa533bec721f536c13f77ccb244cc723946e4462a7a6e78a18c5ff433ed2969821979ca499eb60429e8a20ddc61b4c20d
Score10/10-
Matiex Main Payload
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-