General
-
Target
04b390af484095276bcb7dade5cba01c.exe
-
Size
723KB
-
Sample
220116-p4m6kafgcm
-
MD5
04b390af484095276bcb7dade5cba01c
-
SHA1
266e539dd3c38ecea6082da852970c98b2dfddbd
-
SHA256
294b39b41c7e5ee3d4cbab54bcc8c49b8233902f1adfddd70a5e7b6291ed68d3
-
SHA512
7205ffc2cfc5feab91c462685e0fa781c2bb3ae1857243b2a55800bd18e17fea8b0ae57c157ee8581c95a7b48fa704698cb67d0c976739b1696b019071d55bfc
Static task
static1
Behavioral task
behavioral1
Sample
04b390af484095276bcb7dade5cba01c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
04b390af484095276bcb7dade5cba01c.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
matiex
https://api.telegram.org/bot1450189305:AAHfgL7ICb0v3fZSdcIiBztyx0_H-vpllH4/sendMessage?chat_id=1239264370
Targets
-
-
Target
04b390af484095276bcb7dade5cba01c.exe
-
Size
723KB
-
MD5
04b390af484095276bcb7dade5cba01c
-
SHA1
266e539dd3c38ecea6082da852970c98b2dfddbd
-
SHA256
294b39b41c7e5ee3d4cbab54bcc8c49b8233902f1adfddd70a5e7b6291ed68d3
-
SHA512
7205ffc2cfc5feab91c462685e0fa781c2bb3ae1857243b2a55800bd18e17fea8b0ae57c157ee8581c95a7b48fa704698cb67d0c976739b1696b019071d55bfc
Score10/10-
Matiex Main Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-