General
-
Target
matiex.exe
-
Size
195KB
-
Sample
200731-rncvn1jqbe
-
MD5
d1af1a8b0975b5c62a095f147e785535
-
SHA1
c98a74a0d5e41e07fc8ec2e35fa4f491abdd11d7
-
SHA256
4ea222802308d610bd7d4cc4034b7d29258c65bbd42580a87a8b1fec227fb11d
-
SHA512
6874902fbb75b649678912610919e6ae6c74608a81d5ed52a45340892d581de8bdbd8dba59477450c5110f1fc009dbc4abd349b60c02716cb37d0aef20669396
Static task
static1
Behavioral task
behavioral1
Sample
matiex.exe
Resource
win7
Behavioral task
behavioral2
Sample
matiex.exe
Resource
win10v200722
Malware Config
Targets
-
-
Target
matiex.exe
-
Size
195KB
-
MD5
d1af1a8b0975b5c62a095f147e785535
-
SHA1
c98a74a0d5e41e07fc8ec2e35fa4f491abdd11d7
-
SHA256
4ea222802308d610bd7d4cc4034b7d29258c65bbd42580a87a8b1fec227fb11d
-
SHA512
6874902fbb75b649678912610919e6ae6c74608a81d5ed52a45340892d581de8bdbd8dba59477450c5110f1fc009dbc4abd349b60c02716cb37d0aef20669396
Score7/10-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-