General
-
Target
a68893e5a83010fb5bb3e5f302f1d9e8.exe
-
Size
704KB
-
Sample
230201-rvqw7sca2t
-
MD5
a68893e5a83010fb5bb3e5f302f1d9e8
-
SHA1
aeeec1d07fa64030b7521841563d6a5076fa6f46
-
SHA256
84713794adf24d58fb273365dad3cf164e859ec678447aeb261edb0a3c0a8e6d
-
SHA512
c3b6a7a0284e6e3253cc6208b7b7b27c6806326db952dfee79ac552fc7a280da50c41165e93aff48c0c62a764c05482367d8d5879d44ed395d88f8e1c5445a8e
-
SSDEEP
12288:aCe8LxGQ7MRSRAsDYeQBWlWc4b70eU06zTwjZ++R5Mi6/ZVgCp0TLAXZoCzZWpfb:aN88Q7aQjDYLWlhW7JUyZ++R5PyZ5pcN
Static task
static1
Behavioral task
behavioral1
Sample
a68893e5a83010fb5bb3e5f302f1d9e8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a68893e5a83010fb5bb3e5f302f1d9e8.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
matiex
Protocol: smtp- Host:
srvc13.turhost.com - Port:
587 - Username:
[email protected] - Password:
italik2015
Targets
-
-
Target
a68893e5a83010fb5bb3e5f302f1d9e8.exe
-
Size
704KB
-
MD5
a68893e5a83010fb5bb3e5f302f1d9e8
-
SHA1
aeeec1d07fa64030b7521841563d6a5076fa6f46
-
SHA256
84713794adf24d58fb273365dad3cf164e859ec678447aeb261edb0a3c0a8e6d
-
SHA512
c3b6a7a0284e6e3253cc6208b7b7b27c6806326db952dfee79ac552fc7a280da50c41165e93aff48c0c62a764c05482367d8d5879d44ed395d88f8e1c5445a8e
-
SSDEEP
12288:aCe8LxGQ7MRSRAsDYeQBWlWc4b70eU06zTwjZ++R5Mi6/ZVgCp0TLAXZoCzZWpfb:aN88Q7aQjDYLWlhW7JUyZ++R5PyZ5pcN
Score10/10-
Matiex Main payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-