General

  • Target

    acd5409f9d010cd52931d76e42923387c6e34ca855b5878e13c16a1c2fa99e27.zip

  • Size

    89KB

  • Sample

    221104-k536ysfhbj

  • MD5

    f978e7cf32888be18030f26c9617896e

  • SHA1

    7fb0d829b4a1b9c68cfc6eca6b1165f3d43c9e67

  • SHA256

    ce906abac5a9ccb39ca72a1a8fd0f7bb0b594e6bae1682cbe41b3996c2c66417

  • SHA512

    604d8b169d723071e85a3a08c2d7b9d57e9a2448316056ca5fdaad2769a20dc7433ffae90022e752f01e3ec9ed5de2b09264d2395ef2488aeb6ed5ce8a9a1419

  • SSDEEP

    1536:Ln3szSmRQpSoGiMTW3sP71NSjnqn594BmYmeNOTCgqh36hf4G4dI0povUkh:ZmRKSIy71NSj044lTTqaf47G0poHh

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1756187234:AAEwfPYzakHSD2qBn9cgXWrQVwhYmkqQScY/sendMessage?chat_id=1704325017

Targets

    • Target

      acd5409f9d010cd52931d76e42923387c6e34ca855b5878e13c16a1c2fa99e27.exe

    • Size

      445KB

    • MD5

      260b0475cb253fdbfe7fcca5da72d654

    • SHA1

      bab9a8096fd77be62e46fbd3d19322798dbf0b2c

    • SHA256

      acd5409f9d010cd52931d76e42923387c6e34ca855b5878e13c16a1c2fa99e27

    • SHA512

      2521e6e3c0d541d412d7a4f5d233c6a7604969fd17f7f2cc32de9ce4236a8539681aa1d505d7363547a5a9edf44e6b6b7b8101307d02ea7d9e19c3adea48dc15

    • SSDEEP

      3072:3owRomXjZLHAJh2DxkUhyvc7kq80CEZ/hs+LZMfKVsvMBOXpWNFCP:vOQBHuU9kfvc7kp+VMKVqsOXpk8

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks