General
-
Target
NK974589.exe
-
Size
342KB
-
Sample
210929-h74t6aead8
-
MD5
ec30bc66cef63f29080c284fe9f66583
-
SHA1
8387b00478606de6cfdd1484fe72dae09c1b4758
-
SHA256
793d3532c805e1e2406fa8d9da0c2dc23dae090a2b7c52ba322abbd864e627a8
-
SHA512
b0e3487b7c28732355b6dde78fb3ff6a221dc2bafb4b712329c68c6246fb5b0420b69b14790347940d8a955880781cd2460fc710430902196e97d2cdbe129726
Static task
static1
Behavioral task
behavioral1
Sample
NK974589.exe
Resource
win7v20210408
Malware Config
Extracted
matiex
https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783
Targets
-
-
Target
NK974589.exe
-
Size
342KB
-
MD5
ec30bc66cef63f29080c284fe9f66583
-
SHA1
8387b00478606de6cfdd1484fe72dae09c1b4758
-
SHA256
793d3532c805e1e2406fa8d9da0c2dc23dae090a2b7c52ba322abbd864e627a8
-
SHA512
b0e3487b7c28732355b6dde78fb3ff6a221dc2bafb4b712329c68c6246fb5b0420b69b14790347940d8a955880781cd2460fc710430902196e97d2cdbe129726
-
Matiex Main Payload
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-