MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c1667fa6f6d37044c403c17010f36efc7e08d47ac2fb36a36b3c7e700eb97d81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Matiex


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: c1667fa6f6d37044c403c17010f36efc7e08d47ac2fb36a36b3c7e700eb97d81
SHA3-384 hash: 47e4a3cdc9177106e3bddf4bfcdffad5aa4c8f10a691efff707b31d4d836ca4592cf46825461a50fa256006ac3dd52de
SHA1 hash: 35e8cbe02f0ce21492333604056e15bdbc923227
MD5 hash: eebb807f8a5a2d47c89648e4fb907f89
humanhash: kansas-april-lactose-batman
File name:VNXT.exe
Download: download sample
Signature Matiex
File size:26'624 bytes
First seen:2021-05-12 20:52:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 768:UbRfsBpK9393OO9P2g0WdBHKu3+nl3VC2X:58P2LsdEjC4
Threatray 202 similar samples on MalwareBazaar
TLSH 5AC2180D1BE88972D2FF4FB5C47161509771E1138543BE9E29CAA0E50DF7A2489CBBA3
Reporter James_inthe_box
Tags:exe Matiex

Intelligence


File Origin
# of uploads :
1
# of downloads :
134
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Matiex KeyLogger
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.MatiexStealer
Status:
Malicious
First seen:
2020-07-03 09:38:38 UTC
File Type:
PE (.Net Exe)
Extracted files:
2
AV detection:
32 of 47 (68.09%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware stealer
Behaviour
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments