General

  • Target

    28f416d3d15990c1f3496f1f50e27430.exe

  • Size

    851KB

  • Sample

    210910-t9j4badeaq

  • MD5

    28f416d3d15990c1f3496f1f50e27430

  • SHA1

    f894aba5978f920d54d054add03f2e4b6e06b199

  • SHA256

    d19dc1aef457a11c415d41b9bec1f6e7679b20aacc6771f789c66701be2d9a10

  • SHA512

    aef4a944ad31362a50351b53b070219aa533bec721f536c13f77ccb244cc723946e4462a7a6e78a18c5ff433ed2969821979ca499eb60429e8a20ddc61b4c20d

Malware Config

Targets

    • Target

      28f416d3d15990c1f3496f1f50e27430.exe

    • Size

      851KB

    • MD5

      28f416d3d15990c1f3496f1f50e27430

    • SHA1

      f894aba5978f920d54d054add03f2e4b6e06b199

    • SHA256

      d19dc1aef457a11c415d41b9bec1f6e7679b20aacc6771f789c66701be2d9a10

    • SHA512

      aef4a944ad31362a50351b53b070219aa533bec721f536c13f77ccb244cc723946e4462a7a6e78a18c5ff433ed2969821979ca499eb60429e8a20ddc61b4c20d

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks