Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 14:58
Behavioral task
behavioral1
Sample
044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f.exe
Resource
win10v2004-20230220-en
General
-
Target
044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f.exe
-
Size
5.0MB
-
MD5
733e0f199b91424bb6f4d3baeaea3688
-
SHA1
84d6360deed9dbd97f1001fe7e4f152bebbcb32c
-
SHA256
044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f
-
SHA512
3a9d4d81b0f4a7c859830162f96344b133052fc36896215891cd6a3b94b18faaba239b4b2b878a2e1e1453ed4aba97d4e05ca634fde776e2e4d6822ec18f72dc
-
SSDEEP
49152:XGbf5gfKJu0zf4R+oUN+edPTPR5Y0Pf/deh/1XwshSLGI/trdxblHK:8FlRm01+j0BA
Malware Config
Signatures
-
Matiex Main payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/644-133-0x0000000000F60000-0x00000000014601E0-memory.dmp family_matiex -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/644-133-0x0000000000F60000-0x00000000014601E0-memory.dmp family_snakekeylogger -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/644-133-0x0000000000F60000-0x00000000014601E0-memory.dmp xmrig