General

  • Target

    da08b2d07e1b6ddbaeeee47d0b67bf19f73418113af94874b6cb6184a5f47f1e

  • Size

    962KB

  • Sample

    220503-yte7msebep

  • MD5

    eec028f8ca010dd9cbd9fb80ddec6dee

  • SHA1

    618477eb49373b40417837294742e26e703ab85e

  • SHA256

    da08b2d07e1b6ddbaeeee47d0b67bf19f73418113af94874b6cb6184a5f47f1e

  • SHA512

    18ee3403ac6bc85012f1d7c4dde13c4fccfd4e9506849eb5f804307d79b501d38aab4cdcb7f42050676fe59ccd984f4852870261a6e82e8e1961836b3416e3de

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783

Targets

    • Target

      aICimr3gAHz4gx6.com

    • Size

      1.5MB

    • MD5

      9276601508a998aa3152add2207c9abf

    • SHA1

      a59da80a5f9e45fe07779f44c9e87e691e91102a

    • SHA256

      522fd7ca621387362eb8122f195c78ffa6124a5b3d5415717ff856b91fca430f

    • SHA512

      0d7f98ced9848d14ad470369d053b88f605d897353d49225b5e45e13a6f760f4ff57f8224030e94e23f7f43546ccf8cb7a08524ed94ad35cde7bbf7905b9e28e

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main Payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks