General

  • Target

    Tax Invoices IN102738 IN102739 IN102740.exe

  • Size

    934KB

  • Sample

    201229-8b7s5l3sxa

  • MD5

    30db124ff404f295e6828615ceffd149

  • SHA1

    9a36a1df328103d28eba4bdb4eb7fce4241e41a3

  • SHA256

    13da94ec76f6fd3fba14bbaca306ee7fd26fe8ddd40858d63f639a97d3807226

  • SHA512

    50333e3a99fe70ad3ce42eaec9b678eac525bf38b7847755367e7eecab4a9f4deadbbf6a59bda2e022bd060e0e7b97de60cd6dd228a204f3567b90f907b6c917

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    mail.zavidovici.ba
  • Port:
    587
  • Username:
    opcina.zavidovici@zavidovici.ba
  • Password:
    12Opc21!

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.zavidovici.ba
  • Port:
    587
  • Username:
    opcina.zavidovici@zavidovici.ba
  • Password:
    12Opc21!

Targets

    • Target

      Tax Invoices IN102738 IN102739 IN102740.exe

    • Size

      934KB

    • MD5

      30db124ff404f295e6828615ceffd149

    • SHA1

      9a36a1df328103d28eba4bdb4eb7fce4241e41a3

    • SHA256

      13da94ec76f6fd3fba14bbaca306ee7fd26fe8ddd40858d63f639a97d3807226

    • SHA512

      50333e3a99fe70ad3ce42eaec9b678eac525bf38b7847755367e7eecab4a9f4deadbbf6a59bda2e022bd060e0e7b97de60cd6dd228a204f3567b90f907b6c917

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks