General
-
Target
d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324
-
Size
269KB
-
Sample
221125-lc6xtabd5v
-
MD5
9496bc692308860f1808a6b141eb7df7
-
SHA1
80b84b08547382757898af00968f34ff5bfec31b
-
SHA256
d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324
-
SHA512
731dbc22b4691de0d686598cea6ccdf1d1911d1f0349eda69a5627b4d709377a6669f3969f61ba5b75fcafb366d920d1dcac35ac722a2efb9eb1f9e241b5e004
-
SSDEEP
6144:ibXGFYBiXBE1py3uDjvrTRQgy8xwm7DVK:bOBiXBIiuXvHigy8xwmPVK
Static task
static1
Behavioral task
behavioral1
Sample
d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324
-
Size
269KB
-
MD5
9496bc692308860f1808a6b141eb7df7
-
SHA1
80b84b08547382757898af00968f34ff5bfec31b
-
SHA256
d256e544c1dbe5a7d111af512e899bf0f81208bc2cc8ca5fba8c701ac7691324
-
SHA512
731dbc22b4691de0d686598cea6ccdf1d1911d1f0349eda69a5627b4d709377a6669f3969f61ba5b75fcafb366d920d1dcac35ac722a2efb9eb1f9e241b5e004
-
SSDEEP
6144:ibXGFYBiXBE1py3uDjvrTRQgy8xwm7DVK:bOBiXBIiuXvHigy8xwmPVK
-
Matiex Main payload
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-