General
-
Target
tmp/vbc.exe
-
Size
1.4MB
-
Sample
211214-q3p47sggfp
-
MD5
3668f9be040098859e662ba94616cc51
-
SHA1
3b3ec4ac86c462747a2190c33ca2a4588fcc9310
-
SHA256
b190c0b66428b594f7507ae98fcc45e1907cb9cdf618919002791241ae94280f
-
SHA512
54fa8de69114af4fc8ccfa5ef11a82587d3b74b5fa80e6e8d1683e5ce997db5d6ffc1b133ebcf97c226c2aad928696198392faaf184486685f0aa2a048a43dd3
Static task
static1
Behavioral task
behavioral1
Sample
tmp/vbc.exe
Resource
win7-en-20211208
Malware Config
Extracted
matiex
https://api.telegram.org/bot1769394961:AAF5BB35akL859CwVaXypIqpVsGWlaKvi7A/sendMessage?chat_id=1735544933
Targets
-
-
Target
tmp/vbc.exe
-
Size
1.4MB
-
MD5
3668f9be040098859e662ba94616cc51
-
SHA1
3b3ec4ac86c462747a2190c33ca2a4588fcc9310
-
SHA256
b190c0b66428b594f7507ae98fcc45e1907cb9cdf618919002791241ae94280f
-
SHA512
54fa8de69114af4fc8ccfa5ef11a82587d3b74b5fa80e6e8d1683e5ce997db5d6ffc1b133ebcf97c226c2aad928696198392faaf184486685f0aa2a048a43dd3
-
Matiex Main Payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-