General
-
Target
bef1a1a790d0fc2997ad2b61e45a681e.exe
-
Size
380KB
-
Sample
220108-jhj9wsdccn
-
MD5
bef1a1a790d0fc2997ad2b61e45a681e
-
SHA1
4977286549133a45f5314f0a61e59365ba5444e5
-
SHA256
3b556f8a00ec76eae2da65106515802e6ccf7f207b93caa00908e412e34e2384
-
SHA512
1a8bbf47f912f5959a21ebf4c92f8639305d8b45df5337fdf117bf9d258dab1685842269cc5fe6849d0e966a9ea6d0c42cec2e763b55d2ae8f93d964f709626e
Static task
static1
Behavioral task
behavioral1
Sample
bef1a1a790d0fc2997ad2b61e45a681e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bef1a1a790d0fc2997ad2b61e45a681e.exe
Resource
win10-en-20211208
Malware Config
Extracted
matiex
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
wellcome100
Targets
-
-
Target
bef1a1a790d0fc2997ad2b61e45a681e.exe
-
Size
380KB
-
MD5
bef1a1a790d0fc2997ad2b61e45a681e
-
SHA1
4977286549133a45f5314f0a61e59365ba5444e5
-
SHA256
3b556f8a00ec76eae2da65106515802e6ccf7f207b93caa00908e412e34e2384
-
SHA512
1a8bbf47f912f5959a21ebf4c92f8639305d8b45df5337fdf117bf9d258dab1685842269cc5fe6849d0e966a9ea6d0c42cec2e763b55d2ae8f93d964f709626e
Score10/10-
Matiex Main Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-