General

  • Target

    4eadab98bb726919ff7748c567a9635981a538e92b83d273b7c5ac02c0b7e40e

  • Size

    736KB

  • Sample

    220215-mnnq2sfcek

  • MD5

    a4ed08dd58d17c8c8b5ab9c98fb65829

  • SHA1

    5ce970bf1623baee0c6025a7c6316bc4a2532e8a

  • SHA256

    4eadab98bb726919ff7748c567a9635981a538e92b83d273b7c5ac02c0b7e40e

  • SHA512

    3a4940bf14d1c091d2d6c3c0a9e2ee07c9835142bcdd192731880dfe7ca68a31deabc94ef0ef1edcdf8dc4af26822dd928de56be8fe9c36a3c17978f787d8733

Malware Config

Targets

    • Target

      4eadab98bb726919ff7748c567a9635981a538e92b83d273b7c5ac02c0b7e40e

    • Size

      736KB

    • MD5

      a4ed08dd58d17c8c8b5ab9c98fb65829

    • SHA1

      5ce970bf1623baee0c6025a7c6316bc4a2532e8a

    • SHA256

      4eadab98bb726919ff7748c567a9635981a538e92b83d273b7c5ac02c0b7e40e

    • SHA512

      3a4940bf14d1c091d2d6c3c0a9e2ee07c9835142bcdd192731880dfe7ca68a31deabc94ef0ef1edcdf8dc4af26822dd928de56be8fe9c36a3c17978f787d8733

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks