General
-
Target
60d41052671306acf238435466b653a1.exe
-
Size
576KB
-
Sample
230113-vahxmsae54
-
MD5
60d41052671306acf238435466b653a1
-
SHA1
1fe0bcdd0af918c6431ae90afb735b81dad8bd84
-
SHA256
3f86682b654d4b3574ea76e5f61b52e7d52ef2bb9c5f7213fb81db750448b114
-
SHA512
7fcfb5b429bb2d46c00a3b3a456eca9e8c2c3375c76abb4421c1cca53c12e3f565a3b699e29042340f47fdf79681c62f33a1c62d8dcb12af68793d053ae2f8c7
-
SSDEEP
12288:aCe8LxGQ7MRSRAsDYeQBWlWc4b70eU06zTwjZ++R5Mi6/ZVgCp0TLAXZo:aN88Q7aQjDYLWlhW7JUyZ++R5PyZ5pc5
Static task
static1
Behavioral task
behavioral1
Sample
60d41052671306acf238435466b653a1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
60d41052671306acf238435466b653a1.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
matiex
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Targets
-
-
Target
60d41052671306acf238435466b653a1.exe
-
Size
576KB
-
MD5
60d41052671306acf238435466b653a1
-
SHA1
1fe0bcdd0af918c6431ae90afb735b81dad8bd84
-
SHA256
3f86682b654d4b3574ea76e5f61b52e7d52ef2bb9c5f7213fb81db750448b114
-
SHA512
7fcfb5b429bb2d46c00a3b3a456eca9e8c2c3375c76abb4421c1cca53c12e3f565a3b699e29042340f47fdf79681c62f33a1c62d8dcb12af68793d053ae2f8c7
-
SSDEEP
12288:aCe8LxGQ7MRSRAsDYeQBWlWc4b70eU06zTwjZ++R5Mi6/ZVgCp0TLAXZo:aN88Q7aQjDYLWlhW7JUyZ++R5PyZ5pc5
Score10/10-
Matiex Main payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-