General
-
Target
JaffaCakes118_03ba23a85802f57beed2d5c69453c6d2
-
Size
500KB
-
Sample
250514-wcfqqszpv2
-
MD5
03ba23a85802f57beed2d5c69453c6d2
-
SHA1
3d83f5623299630fd6f57a567ac048c7d1853dcb
-
SHA256
39d7b97907b7836d51b332d85ecdbf4cd5fa55de562959a020a6752adeea4e1c
-
SHA512
028c6edb097565b888589159fb7c8eb92604c333ac58cd075447eb369ae2cd071b85ee0ffdd427ec448fe1b3070adfe26ff5c28482b997a630f8f95b719e2974
-
SSDEEP
6144:KbCwND4GM89iCb/MN6TeKyzErvWiGJgKJhHgK:Ql4Cbb/MpVKpKJ5gK
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_03ba23a85802f57beed2d5c69453c6d2.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
matiex
https://api.telegram.org/bot1271137457:AAFNGECSqnP1dXVAPgbr-EWVUDbzylXjmhg/sendMessage?chat_id=1216524090
Targets
-
-
Target
JaffaCakes118_03ba23a85802f57beed2d5c69453c6d2
-
Size
500KB
-
MD5
03ba23a85802f57beed2d5c69453c6d2
-
SHA1
3d83f5623299630fd6f57a567ac048c7d1853dcb
-
SHA256
39d7b97907b7836d51b332d85ecdbf4cd5fa55de562959a020a6752adeea4e1c
-
SHA512
028c6edb097565b888589159fb7c8eb92604c333ac58cd075447eb369ae2cd071b85ee0ffdd427ec448fe1b3070adfe26ff5c28482b997a630f8f95b719e2974
-
SSDEEP
6144:KbCwND4GM89iCb/MN6TeKyzErvWiGJgKJhHgK:Ql4Cbb/MpVKpKJ5gK
-
Matiex Main payload
-
Matiex family
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-