General
-
Target
e3c1114b2db69d8480751fbaac9a517a3d7d4e5cd4d2175771968f9bdd778c42
-
Size
708KB
-
Sample
220502-1c217aebap
-
MD5
88c1fa128e37e9f8775bd79a0c0cb919
-
SHA1
0a73ccc25e4522236bfdfd9a1f51c1482b05066f
-
SHA256
e3c1114b2db69d8480751fbaac9a517a3d7d4e5cd4d2175771968f9bdd778c42
-
SHA512
2ca700c70ac859a87048a8f92bc1b9025d35915c0f0dd2ff62b5a46520f3910710fdcdcacc41a1cc2deaef5c54e05d7ef7c936d697bc4685fc4f9acb5df028f8
Static task
static1
Behavioral task
behavioral1
Sample
0908000090000.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0908000090000.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
matiex
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Targets
-
-
Target
0908000090000.exe
-
Size
3.4MB
-
MD5
2b16401ac7e40343abde78deb36f0746
-
SHA1
6c441249071a590f6a1178cc276f87f8641c8cf4
-
SHA256
315e6e844a325bdbdbd68365d389adb3e31c55cf7323936f14f3e48f7e5f3014
-
SHA512
3ec8ac63db7b07b9a43b37f27cc80da7543baab0c259e25de2e92cc058427b385d4dc6aa91fc12cdd3b1d6d40c20df1a5c7731ec750a91770f98631c1840a9b8
-
Matiex Main Payload
-
Modifies WinLogon for persistence
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-