General

  • Target

    b577138111c80cdcde338683038c04be.exe

  • Size

    1.7MB

  • Sample

    220321-jxpsxsaecm

  • MD5

    b577138111c80cdcde338683038c04be

  • SHA1

    d4a9804675c85b1a7ac28858e6fb8cdd92018e23

  • SHA256

    31211fd1239d9e0de50a1af9ad1e71a55be0dac1e55e06444d2537caa96bd0c6

  • SHA512

    78de0e55882061f05dfb9ad20a023b05cf7e58f53873eceff90b271957bfc0b1b6f3a1e9820fb20bcf3621de726043c1e519af42349d2312f093432377586d83

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    ebop.website
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    P@ssw0rdP@ssw0rd

Targets

    • Target

      b577138111c80cdcde338683038c04be.exe

    • Size

      1.7MB

    • MD5

      b577138111c80cdcde338683038c04be

    • SHA1

      d4a9804675c85b1a7ac28858e6fb8cdd92018e23

    • SHA256

      31211fd1239d9e0de50a1af9ad1e71a55be0dac1e55e06444d2537caa96bd0c6

    • SHA512

      78de0e55882061f05dfb9ad20a023b05cf7e58f53873eceff90b271957bfc0b1b6f3a1e9820fb20bcf3621de726043c1e519af42349d2312f093432377586d83

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks