General

  • Target

    Confirmation Of Proforma Invoice.exe

  • Size

    1.5MB

  • Sample

    210728-nsp4f5t56e

  • MD5

    f5142955783a16ea5957a10c51e64f33

  • SHA1

    c843043f0b39623bf0862f8460b669c923b4c2e9

  • SHA256

    a80660a551d427bd67935c0380d3edca52a17a57005dde154ba2acfd29bebade

  • SHA512

    e214ac6ba2d3cb4d9b6c77fc7ce87345d196542f50531d93b103803b5f5c16c4bb59424325ad8ccbf7095af6db1428c4ffea489287aa73aae2358734913870b5

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    mail.thts.vn
  • Port:
    25
  • Username:
    [email protected]
  • Password:
    123luongngan1989

Targets

    • Target

      Confirmation Of Proforma Invoice.exe

    • Size

      1.5MB

    • MD5

      f5142955783a16ea5957a10c51e64f33

    • SHA1

      c843043f0b39623bf0862f8460b669c923b4c2e9

    • SHA256

      a80660a551d427bd67935c0380d3edca52a17a57005dde154ba2acfd29bebade

    • SHA512

      e214ac6ba2d3cb4d9b6c77fc7ce87345d196542f50531d93b103803b5f5c16c4bb59424325ad8ccbf7095af6db1428c4ffea489287aa73aae2358734913870b5

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks