General
-
Target
32c7304278be2831eb34d6d28f81badb6f743eb656d2b86eda764291d5eb91cb
-
Size
695KB
-
Sample
220221-22b2qsbdg2
-
MD5
963be4b69fd4e6072b6360700097cd91
-
SHA1
4ff479fa48d100a74f4610dab8853d1e1b754308
-
SHA256
32c7304278be2831eb34d6d28f81badb6f743eb656d2b86eda764291d5eb91cb
-
SHA512
c3cec52e7b2ac8bcca169265908e77c13350762ff493aa6aba236201d4c484db53c8c6c70e8842022b49ccf37e3c0eb15c85966d4c4bfcb0be1ac6d0dbb3b52e
Static task
static1
Behavioral task
behavioral1
Sample
odT0zoYLJiNUQXd.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
odT0zoYLJiNUQXd.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Nigerian99
Extracted
matiex
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Nigerian99
Targets
-
-
Target
odT0zoYLJiNUQXd.exe
-
Size
1.0MB
-
MD5
d3e395135ceb5da670e0bbfd0b1a142b
-
SHA1
a108f551b8493de56146e9ce78fbbbf1ca1469af
-
SHA256
e906ee6485c777452c364eb7950b0553061565e9fa01dd56aed9097493c9af2b
-
SHA512
0219d16b85619ce4a3006029e6c227c245386f009e5a5546f1cd3f1a1ae7a04780086a258c3c7e8a72a20532e9efd1de0c63a0f762fd095c9f51308ce46aff26
Score10/10-
Matiex Main Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-