General

  • Target

    67f1c7ac6d42dbef538d693299efe53f.exe

  • Size

    576KB

  • Sample

    230211-kpwryaca88

  • MD5

    67f1c7ac6d42dbef538d693299efe53f

  • SHA1

    3f50db5ab472e4b3c26bbd29f8d0ca263aa2d206

  • SHA256

    304fe28472a190be87a8ba280d25c15462adbe87dd31f60ce094fb01e2edbeb5

  • SHA512

    986e01b9dbad0c9814681d1eb724d2dac2493da1a1d36513f32d8c72c8207f34e0618186526a13bd4bed75f6981ed29fbf97a39e599592050064e82d65dc7438

  • SSDEEP

    12288:aCe8LxGQ7MRSRAsDYeQBWlWc4b70eU06zTwjZ++R5Mi6/ZVgCp0TLAXZo:aN88Q7aQjDYLWlhW7JUyZ++R5PyZ5pc5

Malware Config

Targets

    • Target

      67f1c7ac6d42dbef538d693299efe53f.exe

    • Size

      576KB

    • MD5

      67f1c7ac6d42dbef538d693299efe53f

    • SHA1

      3f50db5ab472e4b3c26bbd29f8d0ca263aa2d206

    • SHA256

      304fe28472a190be87a8ba280d25c15462adbe87dd31f60ce094fb01e2edbeb5

    • SHA512

      986e01b9dbad0c9814681d1eb724d2dac2493da1a1d36513f32d8c72c8207f34e0618186526a13bd4bed75f6981ed29fbf97a39e599592050064e82d65dc7438

    • SSDEEP

      12288:aCe8LxGQ7MRSRAsDYeQBWlWc4b70eU06zTwjZ++R5Mi6/ZVgCp0TLAXZo:aN88Q7aQjDYLWlhW7JUyZ++R5PyZ5pc5

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks