General
-
Target
52f13f6be6220affb4acc182f974dabe.exe
-
Size
841KB
-
Sample
211230-jeq82aebhk
-
MD5
52f13f6be6220affb4acc182f974dabe
-
SHA1
275d2e03ece179e04787fd2fd4174589a4794d2d
-
SHA256
2568251040acb82859e2944aac69d01701c95d89d3d28e30a02b5445a0946ca1
-
SHA512
13ee949087eaf6253b2f2395c2e00bf44e303cd334971219faf87e2bfd83371df51d543d20f834cf5dbaacfc81928e3c2590501de8a816bfbfb40866413af330
Static task
static1
Behavioral task
behavioral1
Sample
52f13f6be6220affb4acc182f974dabe.exe
Resource
win7-en-20211208
Malware Config
Extracted
matiex
https://api.telegram.org/bot1915791669:AAHbaTcWupO_GTP0Ize2y4KAhHdYK5bPczo/sendMessage?chat_id=1114717555
Extracted
asyncrat
0.5.7B
Default
52.178.132.52:6606
52.178.132.52:7707
52.178.132.52:8808
AsyncMutex_6SI8OkPnk
-
anti_vm
false
-
bsod
true
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
Targets
-
-
Target
52f13f6be6220affb4acc182f974dabe.exe
-
Size
841KB
-
MD5
52f13f6be6220affb4acc182f974dabe
-
SHA1
275d2e03ece179e04787fd2fd4174589a4794d2d
-
SHA256
2568251040acb82859e2944aac69d01701c95d89d3d28e30a02b5445a0946ca1
-
SHA512
13ee949087eaf6253b2f2395c2e00bf44e303cd334971219faf87e2bfd83371df51d543d20f834cf5dbaacfc81928e3c2590501de8a816bfbfb40866413af330
-
Matiex Main Payload
-
Async RAT payload
-
Looks for VirtualBox Guest Additions in registry
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-