General

  • Target

    4fa42a8beb305337e28cede06ceefa62_JaffaCakes118

  • Size

    669KB

  • Sample

    240716-xryersydph

  • MD5

    4fa42a8beb305337e28cede06ceefa62

  • SHA1

    1ad401dc70385788123ae837eea020a9c1d9e9d9

  • SHA256

    c38b853587846014052d5b2206e8764dac66f7de9479ec3080e1872938bd7ceb

  • SHA512

    81dc56b84e3e95169de458d5842c50347455365388b96155aa25a7fea27dc756d20180265ee2b796b2d6ebc2d04d622a6fa9259877f371e956e1458415046807

  • SSDEEP

    12288:mEcQS8zfwkDWsWUZT3HVCuNhzmSEuH/KVTXr2tb:Fcn8zfw+WUZT3HVCuNhqWfKFXr2t

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MARYolanmauluogwo@ever

Targets

    • Target

      4fa42a8beb305337e28cede06ceefa62_JaffaCakes118

    • Size

      669KB

    • MD5

      4fa42a8beb305337e28cede06ceefa62

    • SHA1

      1ad401dc70385788123ae837eea020a9c1d9e9d9

    • SHA256

      c38b853587846014052d5b2206e8764dac66f7de9479ec3080e1872938bd7ceb

    • SHA512

      81dc56b84e3e95169de458d5842c50347455365388b96155aa25a7fea27dc756d20180265ee2b796b2d6ebc2d04d622a6fa9259877f371e956e1458415046807

    • SSDEEP

      12288:mEcQS8zfwkDWsWUZT3HVCuNhzmSEuH/KVTXr2tb:Fcn8zfw+WUZT3HVCuNhqWfKFXr2t

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main payload

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Drops startup file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks