General

  • Target

    54dc35ab78394f31963d2f0bd30a6b7b

  • Size

    656KB

  • Sample

    240111-3a9z5aadbr

  • MD5

    54dc35ab78394f31963d2f0bd30a6b7b

  • SHA1

    4904138a54baf5cb440933e502ff6e8cb6b00829

  • SHA256

    ec45a354ba2c7cba3c064325f968d62cdb3999122b76080dd145cc49f13bf7e7

  • SHA512

    c54d2abf270dd31eb9e3bf44762803f3d1e4d41a6ea43fd37003a64983fddbac5545a5dafe15b3224aadb7f25037c8dc8818480210a30ef6ed69fef326895d7b

  • SSDEEP

    12288:lrf0P3HD5Y2fxOZAcLlQuhntyyFgF1/OV0b4R7wZSEleGxCRfdbBKqS/XWsHFsdn:2P3H1Y2f4HLVnILvOV0b4R7ASEleGmft

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783

Targets

    • Target

      54dc35ab78394f31963d2f0bd30a6b7b

    • Size

      656KB

    • MD5

      54dc35ab78394f31963d2f0bd30a6b7b

    • SHA1

      4904138a54baf5cb440933e502ff6e8cb6b00829

    • SHA256

      ec45a354ba2c7cba3c064325f968d62cdb3999122b76080dd145cc49f13bf7e7

    • SHA512

      c54d2abf270dd31eb9e3bf44762803f3d1e4d41a6ea43fd37003a64983fddbac5545a5dafe15b3224aadb7f25037c8dc8818480210a30ef6ed69fef326895d7b

    • SSDEEP

      12288:lrf0P3HD5Y2fxOZAcLlQuhntyyFgF1/OV0b4R7wZSEleGxCRfdbBKqS/XWsHFsdn:2P3H1Y2f4HLVnILvOV0b4R7ASEleGmft

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks