General

  • Target

    0049113ba9bdda6201ac9ca225b8a224_JaffaCakes118

  • Size

    692KB

  • Sample

    240727-y6c8tawdjl

  • MD5

    0049113ba9bdda6201ac9ca225b8a224

  • SHA1

    34c73e9ce5bfb82e09c35906139dd06f716cb475

  • SHA256

    4f180b0d01bfd9ebecfc92f5268f10a80562bfdbaaaa3baf35ec91dd44a65643

  • SHA512

    cc0a558ce63adf2105ee89c45e9794d5586b90eef1617bcda6b17c743fd6410f801987be0cd3957a19d668cb3f36a82c5fc767f51aa6195db4726150e93f6380

  • SSDEEP

    12288:9StygfdP/9pP2tLBY6STjRyLwycgP+pITEQA6lM8x34Na497EttGNgIa:9SZfdX9J2JBqPRcwWP+6ZX2

Malware Config

Extracted

Family

matiex

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ashok-photos.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    user=ADOBE-LMS\admin$

Targets

    • Target

      0049113ba9bdda6201ac9ca225b8a224_JaffaCakes118

    • Size

      692KB

    • MD5

      0049113ba9bdda6201ac9ca225b8a224

    • SHA1

      34c73e9ce5bfb82e09c35906139dd06f716cb475

    • SHA256

      4f180b0d01bfd9ebecfc92f5268f10a80562bfdbaaaa3baf35ec91dd44a65643

    • SHA512

      cc0a558ce63adf2105ee89c45e9794d5586b90eef1617bcda6b17c743fd6410f801987be0cd3957a19d668cb3f36a82c5fc767f51aa6195db4726150e93f6380

    • SSDEEP

      12288:9StygfdP/9pP2tLBY6STjRyLwycgP+pITEQA6lM8x34Na497EttGNgIa:9SZfdX9J2JBqPRcwWP+6ZX2

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Credential Access

Credentials from Password Stores

1
T1555

Credentials from Web Browsers

1
T1555.003

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks