General

  • Target

    fd70265ad37a25c349eb693197e1f48ac62b8566

  • Size

    1.2MB

  • Sample

    210909-qj3aesbdcj

  • MD5

    b4c27f072271921d937b82f36b142426

  • SHA1

    fd70265ad37a25c349eb693197e1f48ac62b8566

  • SHA256

    c878e72b6b5be5ec505aaddf7811750533e3507505102dae09fe5f5a0c761bf4

  • SHA512

    c594c36c61d0110266fbd5bffae70186ccc91262f618d0f6ad91476af17de4bc70a8d8187acccc6ae0db27351a483780e2a70a9e3fc8c43b5f9ef11bf83ba9cd

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1981462203:AAHe-qfJ-OUGrRMXEVqZGGP8SBSUyb-DHS4/sendMessage?chat_id=1875073748

Targets

    • Target

      fd70265ad37a25c349eb693197e1f48ac62b8566

    • Size

      1.2MB

    • MD5

      b4c27f072271921d937b82f36b142426

    • SHA1

      fd70265ad37a25c349eb693197e1f48ac62b8566

    • SHA256

      c878e72b6b5be5ec505aaddf7811750533e3507505102dae09fe5f5a0c761bf4

    • SHA512

      c594c36c61d0110266fbd5bffae70186ccc91262f618d0f6ad91476af17de4bc70a8d8187acccc6ae0db27351a483780e2a70a9e3fc8c43b5f9ef11bf83ba9cd

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks