General
-
Target
992c8c63aa0978780c459f741825cfc6e118b08a26f57cabccb08bd864e2ee5e
-
Size
213KB
-
Sample
220414-pkfx5sgccr
-
MD5
3999c8722f4fc91a02ea2637300329e4
-
SHA1
4242749c41a0feea4733e654a023c84b25384882
-
SHA256
992c8c63aa0978780c459f741825cfc6e118b08a26f57cabccb08bd864e2ee5e
-
SHA512
a45dcb646c4b2924f110572c9bdcaa93338918f1b35c3774271b36fb46c380789bd51b5f1b350464f569e064e7c0a7cdf7c752c70aeb281463f9af40eeb46353
Static task
static1
Behavioral task
behavioral1
Sample
50208488 AEJEA 81890010169430.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
50208488 AEJEA 81890010169430.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
matiex
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Targets
-
-
Target
50208488 AEJEA 81890010169430.exe
-
Size
581KB
-
MD5
1b485e01e597352e81f18d2a828edee3
-
SHA1
09329b97c027cffbc9d34e5d49a3794b7209e246
-
SHA256
039b571653cbd974ebb9e8c37c048d0f9c4e5302db86a7400ed7a81708cb6c8c
-
SHA512
a124dbed4e5cc1809f9e473e2c0c84ddce944955ecb50adc8bf57f5134e0f282722a6a4ad23e62e2df333eaebe57878b0d40bae40867f24c9ec5efdb9b9ba53e
Score10/10-
Matiex Main Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-