General
-
Target
350a0cba7d54a943a4f4fda9cd8c2184681025250de406b25998a4f053ce69f8
-
Size
321KB
-
Sample
220221-2zx67abdf3
-
MD5
fb6ffd7b2e6c520a903c478c8e04d3f3
-
SHA1
033d9d0af07c5f90102d1df595c795c223e12f5e
-
SHA256
350a0cba7d54a943a4f4fda9cd8c2184681025250de406b25998a4f053ce69f8
-
SHA512
d401e57b1bace02bacb311b60adb1f2759e5359f83022a8c04fe6dada2385f157ea8f38cb9f20603035f841417ae8a56473d1c232938406e341acff80c759e47
Static task
static1
Behavioral task
behavioral1
Sample
PO# 2366.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
PO# 2366.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
matiex
https://api.telegram.org/bot1277090811:AAHJ1mutkv0Wr1_9949BBcb3lR-DuRKH5RU/sendMessage?chat_id=1216524090
Targets
-
-
Target
PO# 2366.exe
-
Size
562KB
-
MD5
87ea6faf43f55191b84e9be3da3bb730
-
SHA1
5d61fdb034fe227740428dd8f025c6ef06c6d7d8
-
SHA256
2026239c3cabfeae27fabc93031453a0af2bb4e18275bb0ee9d9ed467d3ae303
-
SHA512
10160f0e589681e6eac32e60cbca665fc01e728d305659154e2e121b0ede7dc3c9dc7bf101fafbc158e9806a46573944dd3ced2eb07b0eafa9e53790c9bf9c14
Score10/10-
Matiex Main Payload
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-