General
-
Target
da08b2d07e1b6ddbaeeee47d0b67bf19f73418113af94874b6cb6184a5f47f1e
-
Size
962KB
-
Sample
220503-yte7msebep
-
MD5
eec028f8ca010dd9cbd9fb80ddec6dee
-
SHA1
618477eb49373b40417837294742e26e703ab85e
-
SHA256
da08b2d07e1b6ddbaeeee47d0b67bf19f73418113af94874b6cb6184a5f47f1e
-
SHA512
18ee3403ac6bc85012f1d7c4dde13c4fccfd4e9506849eb5f804307d79b501d38aab4cdcb7f42050676fe59ccd984f4852870261a6e82e8e1961836b3416e3de
Static task
static1
Behavioral task
behavioral1
Sample
aICimr3gAHz4gx6.exe
Resource
win7-20220414-en
Malware Config
Extracted
matiex
https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783
Targets
-
-
Target
aICimr3gAHz4gx6.com
-
Size
1.5MB
-
MD5
9276601508a998aa3152add2207c9abf
-
SHA1
a59da80a5f9e45fe07779f44c9e87e691e91102a
-
SHA256
522fd7ca621387362eb8122f195c78ffa6124a5b3d5415717ff856b91fca430f
-
SHA512
0d7f98ced9848d14ad470369d053b88f605d897353d49225b5e45e13a6f760f4ff57f8224030e94e23f7f43546ccf8cb7a08524ed94ad35cde7bbf7905b9e28e
-
Matiex Main Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-