General
-
Target
149aa5d2591be26a7f66ec6c6443e94301efc3f1c0dad83c6dc34e49b22ee325N
-
Size
716KB
-
Sample
240921-cq7xla1amm
-
MD5
5bbc4c13ea38c58d5c3c2bc8f558f800
-
SHA1
65075202a7a44b7d2735ad44869d49f59373e615
-
SHA256
149aa5d2591be26a7f66ec6c6443e94301efc3f1c0dad83c6dc34e49b22ee325
-
SHA512
cff4c12ee90eef55ab5f75e3f15c7f5f78ef44706bc3bffc05afcfca45bba39b66aa5a6602b0aef036d62e5eb4211fae434df3f76f09ab84cdc505b5950e0bcd
-
SSDEEP
12288:lXcqhWkdzkMWzcw9OsOSsyRvy1u7kqtf2ssp2JcPpHL4JiV8qGV3wGa7Y8vh4HZI:lXc/SzGzc8OsO9yRvlD2ssp2eRHksiG5
Static task
static1
Behavioral task
behavioral1
Sample
149aa5d2591be26a7f66ec6c6443e94301efc3f1c0dad83c6dc34e49b22ee325N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
149aa5d2591be26a7f66ec6c6443e94301efc3f1c0dad83c6dc34e49b22ee325N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
149aa5d2591be26a7f66ec6c6443e94301efc3f1c0dad83c6dc34e49b22ee325N
-
Size
716KB
-
MD5
5bbc4c13ea38c58d5c3c2bc8f558f800
-
SHA1
65075202a7a44b7d2735ad44869d49f59373e615
-
SHA256
149aa5d2591be26a7f66ec6c6443e94301efc3f1c0dad83c6dc34e49b22ee325
-
SHA512
cff4c12ee90eef55ab5f75e3f15c7f5f78ef44706bc3bffc05afcfca45bba39b66aa5a6602b0aef036d62e5eb4211fae434df3f76f09ab84cdc505b5950e0bcd
-
SSDEEP
12288:lXcqhWkdzkMWzcw9OsOSsyRvy1u7kqtf2ssp2JcPpHL4JiV8qGV3wGa7Y8vh4HZI:lXc/SzGzc8OsO9yRvlD2ssp2eRHksiG5
-
Matiex Main payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-