General

  • Target

    c1ec75cdf8a1c8406c9316157f9b8d30.exe

  • Size

    536KB

  • Sample

    201221-khphxhlpvs

  • MD5

    c1ec75cdf8a1c8406c9316157f9b8d30

  • SHA1

    2616c352680005510ee57229a534a9a8b66d1b6d

  • SHA256

    1ad22f5ef94ef0cc6f10e24f3233747dd251f2ad3053aa049b20fb594c03fb3d

  • SHA512

    1c56a304b68d0f5fe42d8b6ca2958bf518e3dcb4aa024067a18d168cee0e454dce875e5e5122206f82f10ba5be12c356ec22618cfac8babc749f4ad0b286f761

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    srvc13.turhost.com
  • Port:
    587
  • Username:
    info@bilgitekdagitim.com
  • Password:
    italik2015

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    srvc13.turhost.com
  • Port:
    587
  • Username:
    info@bilgitekdagitim.com
  • Password:
    italik2015

Targets

    • Target

      c1ec75cdf8a1c8406c9316157f9b8d30.exe

    • Size

      536KB

    • MD5

      c1ec75cdf8a1c8406c9316157f9b8d30

    • SHA1

      2616c352680005510ee57229a534a9a8b66d1b6d

    • SHA256

      1ad22f5ef94ef0cc6f10e24f3233747dd251f2ad3053aa049b20fb594c03fb3d

    • SHA512

      1c56a304b68d0f5fe42d8b6ca2958bf518e3dcb4aa024067a18d168cee0e454dce875e5e5122206f82f10ba5be12c356ec22618cfac8babc749f4ad0b286f761

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Tasks