General

  • Target

    6d6b5d82859c0acb0f0d5635f4acd01ab932b6f0dac01443abd129049096a398

  • Size

    739KB

  • Sample

    220501-3djmcaahen

  • MD5

    624696762a64d45cd7153d038fe1aef6

  • SHA1

    62a3b3b5e4de3d434356ad2ec83635efc8515f1e

  • SHA256

    6d6b5d82859c0acb0f0d5635f4acd01ab932b6f0dac01443abd129049096a398

  • SHA512

    dca4a77720170b23fa43f1c80920b3d5cca85d5a2a26f59c6cd26efc99f73f499166ced4ea8037db92ff427a7ea1a5ca8bf9f6c5bef26d83462b44fde10b741d

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    ebop.website
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    P@ssw0rdP@ssw0rd

Targets

    • Target

      6d6b5d82859c0acb0f0d5635f4acd01ab932b6f0dac01443abd129049096a398

    • Size

      739KB

    • MD5

      624696762a64d45cd7153d038fe1aef6

    • SHA1

      62a3b3b5e4de3d434356ad2ec83635efc8515f1e

    • SHA256

      6d6b5d82859c0acb0f0d5635f4acd01ab932b6f0dac01443abd129049096a398

    • SHA512

      dca4a77720170b23fa43f1c80920b3d5cca85d5a2a26f59c6cd26efc99f73f499166ced4ea8037db92ff427a7ea1a5ca8bf9f6c5bef26d83462b44fde10b741d

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks