General
-
Target
0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971
-
Size
664KB
-
Sample
220222-zwejkafaak
-
MD5
329d395b6edfc1c931bbd0c9dd8b5be5
-
SHA1
d6cbbeaec3e3571acc01470b01ea4e926e9a4a50
-
SHA256
0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971
-
SHA512
6ae1fb8aa6dd4fbbf0d70587bbf6ff291514ef33d2b4699d50a9ccac55b692a457a6d94dc7afca611d781d12da47c65c505314faf2015f34141639bcd263bff1
Static task
static1
Behavioral task
behavioral1
Sample
0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
matiex
Protocol: smtp- Host:
kerekesfoto.com - Port:
587 - Username:
[email protected] - Password:
^VrNT3@F81sT - Email To:
[email protected]
Targets
-
-
Target
0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971
-
Size
664KB
-
MD5
329d395b6edfc1c931bbd0c9dd8b5be5
-
SHA1
d6cbbeaec3e3571acc01470b01ea4e926e9a4a50
-
SHA256
0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971
-
SHA512
6ae1fb8aa6dd4fbbf0d70587bbf6ff291514ef33d2b4699d50a9ccac55b692a457a6d94dc7afca611d781d12da47c65c505314faf2015f34141639bcd263bff1
-
Matiex Main Payload
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-