General

  • Target

    ee3a65a55a8a5401508bbb1c768afe90c92f42abb4181f17a32cfebaeb9408ba

  • Size

    764KB

  • Sample

    220502-schcsafec4

  • MD5

    c1f0d6a6b9e1f4af3103c6814866292a

  • SHA1

    3793096dc698b31e8ec42b6d1734212a48db6852

  • SHA256

    ee3a65a55a8a5401508bbb1c768afe90c92f42abb4181f17a32cfebaeb9408ba

  • SHA512

    17c93689a1b2fe6df0711209e9c62d5e0e3bebe5d5af72ab04b0d36edfc4cf3031e296fd17dd9bbd5e7affcc4dcf990f38e0f9ec59d2606d3acc53df5732ecca

Malware Config

Extracted

Family

matiex

Credentials

Targets

    • Target

      ee3a65a55a8a5401508bbb1c768afe90c92f42abb4181f17a32cfebaeb9408ba

    • Size

      764KB

    • MD5

      c1f0d6a6b9e1f4af3103c6814866292a

    • SHA1

      3793096dc698b31e8ec42b6d1734212a48db6852

    • SHA256

      ee3a65a55a8a5401508bbb1c768afe90c92f42abb4181f17a32cfebaeb9408ba

    • SHA512

      17c93689a1b2fe6df0711209e9c62d5e0e3bebe5d5af72ab04b0d36edfc4cf3031e296fd17dd9bbd5e7affcc4dcf990f38e0f9ec59d2606d3acc53df5732ecca

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks