General
-
Target
9de7dfa28d29ec429826e3b47b99abf8.exe
-
Size
435KB
-
Sample
220504-fxkbnadah9
-
MD5
9de7dfa28d29ec429826e3b47b99abf8
-
SHA1
74be01d8ee6e05afa47f770c25f5c8d1bcb0bac5
-
SHA256
18ea09f41d879689cd0da5ba64dd8c4a087702801e618b942a65c0e76c0447ca
-
SHA512
2349642083b8e7d3d86f49957a4e436493f3b401dcf5b59a5a8b74c33af745b4c0e25f785ed7ed9f111f5617c8e65bc78e560c9477ee069c4249be3446e526ef
Static task
static1
Behavioral task
behavioral1
Sample
9de7dfa28d29ec429826e3b47b99abf8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9de7dfa28d29ec429826e3b47b99abf8.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
matiex
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Megatrone1
Targets
-
-
Target
9de7dfa28d29ec429826e3b47b99abf8.exe
-
Size
435KB
-
MD5
9de7dfa28d29ec429826e3b47b99abf8
-
SHA1
74be01d8ee6e05afa47f770c25f5c8d1bcb0bac5
-
SHA256
18ea09f41d879689cd0da5ba64dd8c4a087702801e618b942a65c0e76c0447ca
-
SHA512
2349642083b8e7d3d86f49957a4e436493f3b401dcf5b59a5a8b74c33af745b4c0e25f785ed7ed9f111f5617c8e65bc78e560c9477ee069c4249be3446e526ef
Score10/10-
Matiex Main Payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-