General

  • Target

    QYD Quotation 20210702.exe

  • Size

    1.1MB

  • Sample

    210722-cednkm438e

  • MD5

    494fc5838b2ff1381ab5d806cf7820a2

  • SHA1

    d7ec8bb026fe526535ed556936ec057409fb00fa

  • SHA256

    e58284d351b21f134a31fdccd3e53f952133f671892da8a86347d7b930399f28

  • SHA512

    1c18d8524f0aecd4b4dfb2518de69c94362c23c60b3bc2e7229e6b06a9ed6e559212d97f740f4675c028cc5c5f9ab12b51d21589a42656232e207d2866120821

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.thts.vn
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    123luongngan1989

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    mail.thts.vn
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    123luongngan1989

Targets

    • Target

      QYD Quotation 20210702.exe

    • Size

      1.1MB

    • MD5

      494fc5838b2ff1381ab5d806cf7820a2

    • SHA1

      d7ec8bb026fe526535ed556936ec057409fb00fa

    • SHA256

      e58284d351b21f134a31fdccd3e53f952133f671892da8a86347d7b930399f28

    • SHA512

      1c18d8524f0aecd4b4dfb2518de69c94362c23c60b3bc2e7229e6b06a9ed6e559212d97f740f4675c028cc5c5f9ab12b51d21589a42656232e207d2866120821

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks