General
-
Target
2f677e930c980bdc2d858e7e9d19041638a575e2edcf5ad6b88503251c4b739e
-
Size
537KB
-
Sample
220508-t92y5aceh5
-
MD5
daaea507a91d60d4f3181affc9d2ffeb
-
SHA1
1bcba07eefde83737919533ce77c477e0b10dda0
-
SHA256
2f677e930c980bdc2d858e7e9d19041638a575e2edcf5ad6b88503251c4b739e
-
SHA512
2f98f0ab1548026ce3e3f3b413f80efe62cbf3a7a99668c44a35be5140de5b78131c347ca3af1bd4ac90d78e73e64ac5358e0daafc40ebb902597c092ee06e53
Static task
static1
Behavioral task
behavioral1
Sample
2f677e930c980bdc2d858e7e9d19041638a575e2edcf5ad6b88503251c4b739e.exe
Resource
win7-20220414-en
Malware Config
Extracted
matiex
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Targets
-
-
Target
2f677e930c980bdc2d858e7e9d19041638a575e2edcf5ad6b88503251c4b739e
-
Size
537KB
-
MD5
daaea507a91d60d4f3181affc9d2ffeb
-
SHA1
1bcba07eefde83737919533ce77c477e0b10dda0
-
SHA256
2f677e930c980bdc2d858e7e9d19041638a575e2edcf5ad6b88503251c4b739e
-
SHA512
2f98f0ab1548026ce3e3f3b413f80efe62cbf3a7a99668c44a35be5140de5b78131c347ca3af1bd4ac90d78e73e64ac5358e0daafc40ebb902597c092ee06e53
-
Matiex Main Payload
-
Suspicious use of SetThreadContext
-