General
-
Target
n545687654589b87656n9.exe
-
Size
290KB
-
Sample
210922-gfqyjsecej
-
MD5
fe8171a07860b995e5b676df7af4917f
-
SHA1
05143b3155f467d7d2c859199edc1f3b5fba86d1
-
SHA256
0dc02738b4f4ff0ec647c5db409d884b67275abae3f3373931e03aff4d15c705
-
SHA512
0de21298f5d678d5f9217961cff78f7e627e7d8f291f303c7f9c74c6c6d63affc6b9f1ea225254feae954fdbe7fb0b559047b76e05b8dcc48aa886a9b0881392
Static task
static1
Behavioral task
behavioral1
Sample
n545687654589b87656n9.exe
Resource
win7v20210408
Malware Config
Extracted
matiex
https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783
Targets
-
-
Target
n545687654589b87656n9.exe
-
Size
290KB
-
MD5
fe8171a07860b995e5b676df7af4917f
-
SHA1
05143b3155f467d7d2c859199edc1f3b5fba86d1
-
SHA256
0dc02738b4f4ff0ec647c5db409d884b67275abae3f3373931e03aff4d15c705
-
SHA512
0de21298f5d678d5f9217961cff78f7e627e7d8f291f303c7f9c74c6c6d63affc6b9f1ea225254feae954fdbe7fb0b559047b76e05b8dcc48aa886a9b0881392
-
Matiex Main Payload
-
suricata: ET MALWARE Matiex Keylogger Exfil Via Telegram
suricata: ET MALWARE Matiex Keylogger Exfil Via Telegram
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-