General
-
Target
d99b8e6673cd8a25487bbea1856080fe.exe
-
Size
446KB
-
Sample
220801-h1392sdhb7
-
MD5
d99b8e6673cd8a25487bbea1856080fe
-
SHA1
68ccd5f609e44f25dbfd0f518a0a770aeda31444
-
SHA256
2fa98cd82e882a468f4dce16d59f30faa6acd4ce3a22fcacbe7325702f3178ab
-
SHA512
5dfb9017ceaf4a1d951c52eee4aea2bebd47356bb1b313ca07260a6cc12d0d960b5e27a8da9c7c5db823721e60a6247433081f1801447ec59de9031eef47e00f
Behavioral task
behavioral1
Sample
d99b8e6673cd8a25487bbea1856080fe.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
d99b8e6673cd8a25487bbea1856080fe.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
matiex
Protocol: smtp- Host:
smpt.mail.ru - Port:
25 - Username:
[email protected] - Password:
Woody123A
Targets
-
-
Target
d99b8e6673cd8a25487bbea1856080fe.exe
-
Size
446KB
-
MD5
d99b8e6673cd8a25487bbea1856080fe
-
SHA1
68ccd5f609e44f25dbfd0f518a0a770aeda31444
-
SHA256
2fa98cd82e882a468f4dce16d59f30faa6acd4ce3a22fcacbe7325702f3178ab
-
SHA512
5dfb9017ceaf4a1d951c52eee4aea2bebd47356bb1b313ca07260a6cc12d0d960b5e27a8da9c7c5db823721e60a6247433081f1801447ec59de9031eef47e00f
Score10/10-
Matiex Main payload
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-