General
-
Target
54dc35ab78394f31963d2f0bd30a6b7b
-
Size
656KB
-
Sample
240111-3a9z5aadbr
-
MD5
54dc35ab78394f31963d2f0bd30a6b7b
-
SHA1
4904138a54baf5cb440933e502ff6e8cb6b00829
-
SHA256
ec45a354ba2c7cba3c064325f968d62cdb3999122b76080dd145cc49f13bf7e7
-
SHA512
c54d2abf270dd31eb9e3bf44762803f3d1e4d41a6ea43fd37003a64983fddbac5545a5dafe15b3224aadb7f25037c8dc8818480210a30ef6ed69fef326895d7b
-
SSDEEP
12288:lrf0P3HD5Y2fxOZAcLlQuhntyyFgF1/OV0b4R7wZSEleGxCRfdbBKqS/XWsHFsdn:2P3H1Y2f4HLVnILvOV0b4R7ASEleGmft
Static task
static1
Behavioral task
behavioral1
Sample
54dc35ab78394f31963d2f0bd30a6b7b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54dc35ab78394f31963d2f0bd30a6b7b.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
matiex
https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783
Targets
-
-
Target
54dc35ab78394f31963d2f0bd30a6b7b
-
Size
656KB
-
MD5
54dc35ab78394f31963d2f0bd30a6b7b
-
SHA1
4904138a54baf5cb440933e502ff6e8cb6b00829
-
SHA256
ec45a354ba2c7cba3c064325f968d62cdb3999122b76080dd145cc49f13bf7e7
-
SHA512
c54d2abf270dd31eb9e3bf44762803f3d1e4d41a6ea43fd37003a64983fddbac5545a5dafe15b3224aadb7f25037c8dc8818480210a30ef6ed69fef326895d7b
-
SSDEEP
12288:lrf0P3HD5Y2fxOZAcLlQuhntyyFgF1/OV0b4R7wZSEleGxCRfdbBKqS/XWsHFsdn:2P3H1Y2f4HLVnILvOV0b4R7ASEleGmft
Score10/10-
Matiex Main payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-