Static task
static1
Behavioral task
behavioral1
Sample
a7145677a983c5a94a197cd7668e61accb0bd7c71dac8be00dd14844226699cd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a7145677a983c5a94a197cd7668e61accb0bd7c71dac8be00dd14844226699cd.exe
Resource
win10v2004-20220414-en
General
-
Target
a7145677a983c5a94a197cd7668e61accb0bd7c71dac8be00dd14844226699cd
-
Size
444KB
-
MD5
163e701ddd59d17d1f058abc15eaab3c
-
SHA1
1ee75c2f3508f3697797fa79be05c459bde0b7f0
-
SHA256
a7145677a983c5a94a197cd7668e61accb0bd7c71dac8be00dd14844226699cd
-
SHA512
1714439427278b0bafb2cccf083a573c42a40e598bb2083fe9a07ab35a764d9468efa3761e5a5f86c22cbd9fa6123a02e882aac720fc50ceb0b882001a6e6019
-
SSDEEP
3072:vMh1iljWoujUl9fx4dkVQ980CEZePUoMRki9nsDxDMRWv6GNQK8:vM1yWoujG9KdkVQ2tUSi9nsDxDsWv6U6
Malware Config
Extracted
matiex
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Goodluck123x
Signatures
-
Matiex Main Payload 1 IoCs
Processes:
resource yara_rule sample family_matiex -
Matiex family
Files
-
a7145677a983c5a94a197cd7668e61accb0bd7c71dac8be00dd14844226699cd.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 441KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ