General

  • Target

    SCANNED DOCUMENT 00001.rtf

  • Size

    341KB

  • Sample

    210916-red8gadeg7

  • MD5

    776ae5196f616bd6bf2a7fe34d7a5812

  • SHA1

    6c576351c60b203500b179054303ccc39db564c5

  • SHA256

    205995e5835ec0afdb827c868f5ec7e8f87f0328ca85ade3ac73cc585790a242

  • SHA512

    a54543e5c66fb66bc61d048f006177ac135df179f3f9a9a4b91c224669cb1250ec5566e547f865a0132c93378e0293aae9c9fdb380af0b4095cc2f005278ba00

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://192.3.110.170/win32/HTM.exe

Extracted

Family

matiex

C2

https://api.telegram.org/bot1902939136:AAHecjYRy7PD3SA0NET2ZO2oQUMhDqeG954/sendMessage?chat_id=1985758957

Targets

    • Target

      SCANNED DOCUMENT 00001.rtf

    • Size

      341KB

    • MD5

      776ae5196f616bd6bf2a7fe34d7a5812

    • SHA1

      6c576351c60b203500b179054303ccc39db564c5

    • SHA256

      205995e5835ec0afdb827c868f5ec7e8f87f0328ca85ade3ac73cc585790a242

    • SHA512

      a54543e5c66fb66bc61d048f006177ac135df179f3f9a9a4b91c224669cb1250ec5566e547f865a0132c93378e0293aae9c9fdb380af0b4095cc2f005278ba00

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks