General

  • Target

    8a534412d79af46791253752c3f81917.exe

  • Size

    439KB

  • Sample

    211003-m53arsfcd3

  • MD5

    8a534412d79af46791253752c3f81917

  • SHA1

    6efde4c9d582b110b1cc342b2ba18df4c637acd6

  • SHA256

    e3f3ed02da22278148950fd72bda0a410d5fd60e56975507da774f392ff099a1

  • SHA512

    1080abb81223f8b9293b7194bc284f844ee1f7609e09e90b28adf978d1de9aba1ba1294bfb2533b2d2d353ad3f8fd4bedd0922a66e8f085cd3038b46ab0e2302

Score
10/10

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mailingjakipaki

Targets

    • Target

      8a534412d79af46791253752c3f81917.exe

    • Size

      439KB

    • MD5

      8a534412d79af46791253752c3f81917

    • SHA1

      6efde4c9d582b110b1cc342b2ba18df4c637acd6

    • SHA256

      e3f3ed02da22278148950fd72bda0a410d5fd60e56975507da774f392ff099a1

    • SHA512

      1080abb81223f8b9293b7194bc284f844ee1f7609e09e90b28adf978d1de9aba1ba1294bfb2533b2d2d353ad3f8fd4bedd0922a66e8f085cd3038b46ab0e2302

    Score
    7/10
    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Tasks