General

  • Target

    logo.exe

  • Size

    15KB

  • Sample

    201221-eeg6yra1m6

  • MD5

    27023178af9de77b8eaa31b33718ebf2

  • SHA1

    f283cccb66e45da836c74059a559d5662cf340a5

  • SHA256

    7beab2868ef93af646071fd61c0ab535230c0f9972980e1bded8f49c9f5392ef

  • SHA512

    24bed02e97a2e4cd0cf620fd966d87a5e3877b43fa373ca1c932179c1e4b32bb0acb66ef59a82d30dfb892981f198e39ba94b3d74082bdf9a4eaf7a84d3358dd

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    sales01@seedwellresources.xyz
  • Password:
    MARYolanmauluogwo@ever

Targets

    • Target

      logo.exe

    • Size

      15KB

    • MD5

      27023178af9de77b8eaa31b33718ebf2

    • SHA1

      f283cccb66e45da836c74059a559d5662cf340a5

    • SHA256

      7beab2868ef93af646071fd61c0ab535230c0f9972980e1bded8f49c9f5392ef

    • SHA512

      24bed02e97a2e4cd0cf620fd966d87a5e3877b43fa373ca1c932179c1e4b32bb0acb66ef59a82d30dfb892981f198e39ba94b3d74082bdf9a4eaf7a84d3358dd

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Modifies WinLogon for persistence

    • Drops startup file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks