General

  • Target

    32c7304278be2831eb34d6d28f81badb6f743eb656d2b86eda764291d5eb91cb

  • Size

    695KB

  • Sample

    220221-22b2qsbdg2

  • MD5

    963be4b69fd4e6072b6360700097cd91

  • SHA1

    4ff479fa48d100a74f4610dab8853d1e1b754308

  • SHA256

    32c7304278be2831eb34d6d28f81badb6f743eb656d2b86eda764291d5eb91cb

  • SHA512

    c3cec52e7b2ac8bcca169265908e77c13350762ff493aa6aba236201d4c484db53c8c6c70e8842022b49ccf37e3c0eb15c85966d4c4bfcb0be1ac6d0dbb3b52e

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Nigerian99

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Nigerian99

Targets

    • Target

      odT0zoYLJiNUQXd.exe

    • Size

      1.0MB

    • MD5

      d3e395135ceb5da670e0bbfd0b1a142b

    • SHA1

      a108f551b8493de56146e9ce78fbbbf1ca1469af

    • SHA256

      e906ee6485c777452c364eb7950b0553061565e9fa01dd56aed9097493c9af2b

    • SHA512

      0219d16b85619ce4a3006029e6c227c245386f009e5a5546f1cd3f1a1ae7a04780086a258c3c7e8a72a20532e9efd1de0c63a0f762fd095c9f51308ce46aff26

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks