General

  • Target

    ORDER PURCHASE.exe

  • Size

    784KB

  • Sample

    201201-ezt1f56fmx

  • MD5

    84a0462a34c489c8c98e88a788017f30

  • SHA1

    e32e552ee9231ad2998658a25df9abd483b6dac9

  • SHA256

    f016e53ada4cdc8efb3468fc036746b14fe0e594ca7749590045f30fde080f97

  • SHA512

    12ec6a019fc14d00873955b26c2af21529d81cf3b550d2f0ceb7acd36c9cfbcf87717b6f4fba4b0df1cc70fa70e20fbcbb38dc4a7c719d55648eca970c30fee5

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    587
  • Username:
    south.lieutenant@valleycountysar.org
  • Password:
    &6q^?75To5Rw

Targets

    • Target

      ORDER PURCHASE.exe

    • Size

      784KB

    • MD5

      84a0462a34c489c8c98e88a788017f30

    • SHA1

      e32e552ee9231ad2998658a25df9abd483b6dac9

    • SHA256

      f016e53ada4cdc8efb3468fc036746b14fe0e594ca7749590045f30fde080f97

    • SHA512

      12ec6a019fc14d00873955b26c2af21529d81cf3b550d2f0ceb7acd36c9cfbcf87717b6f4fba4b0df1cc70fa70e20fbcbb38dc4a7c719d55648eca970c30fee5

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks