General

  • Target

    47693174c4e7379e21db719d187e82dfca4e97653e20526e7aa57b9b663bb34a

  • Size

    645KB

  • Sample

    220319-3swkfscdg2

  • MD5

    1912db849337b8d239dc4eb2f4c99ff3

  • SHA1

    07d4d56809d2e2ec063cb4e1fe8b815b33477314

  • SHA256

    47693174c4e7379e21db719d187e82dfca4e97653e20526e7aa57b9b663bb34a

  • SHA512

    1e44c71d7490b30d455bc92f2be3614f1412c1e9f8f12a58906459ce247565a0ec53bd29201bcd4858b96c71119be577dbe0f22d02b6aab613a9d7c88b576726

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MARYolanmauluogwo@ever

Targets

    • Target

      47693174c4e7379e21db719d187e82dfca4e97653e20526e7aa57b9b663bb34a

    • Size

      645KB

    • MD5

      1912db849337b8d239dc4eb2f4c99ff3

    • SHA1

      07d4d56809d2e2ec063cb4e1fe8b815b33477314

    • SHA256

      47693174c4e7379e21db719d187e82dfca4e97653e20526e7aa57b9b663bb34a

    • SHA512

      1e44c71d7490b30d455bc92f2be3614f1412c1e9f8f12a58906459ce247565a0ec53bd29201bcd4858b96c71119be577dbe0f22d02b6aab613a9d7c88b576726

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks