General

  • Target

    8988b694b9df9186d686b9479984c675_JaffaCakes118

  • Size

    908KB

  • Sample

    241103-ekq31avckj

  • MD5

    8988b694b9df9186d686b9479984c675

  • SHA1

    d54c8e34344c3b86cc883c2ffa89d020c0911755

  • SHA256

    0e9b75e527544aa8db9880eb423b73f0edfb79995be585eb2d69c735068d082e

  • SHA512

    72352807711c2a1799920fdc934ab3aaa1730b718447c8c70fefebb3c7243941feeb9c05f2eced48358ca114df789e97ad3be160b766e773312535de27d6e4c6

  • SSDEEP

    12288:Y7KAD7WCSbo4N2So9pGwINUbKbSZTlWxYGNhCJh7EW58M8zOGcbq1TT6ygvhNwEc:eK+Ms9fAkvhS+c9

Malware Config

Extracted

Family

matiex

C2

https://api.telegram.org/bot1395392888:AAFrJovDdZICOFB0gX0eGWrAUzEKCRpv8xo/sendMessage?chat_id=1300181783

Targets

    • Target

      8988b694b9df9186d686b9479984c675_JaffaCakes118

    • Size

      908KB

    • MD5

      8988b694b9df9186d686b9479984c675

    • SHA1

      d54c8e34344c3b86cc883c2ffa89d020c0911755

    • SHA256

      0e9b75e527544aa8db9880eb423b73f0edfb79995be585eb2d69c735068d082e

    • SHA512

      72352807711c2a1799920fdc934ab3aaa1730b718447c8c70fefebb3c7243941feeb9c05f2eced48358ca114df789e97ad3be160b766e773312535de27d6e4c6

    • SSDEEP

      12288:Y7KAD7WCSbo4N2So9pGwINUbKbSZTlWxYGNhCJh7EW58M8zOGcbq1TT6ygvhNwEc:eK+Ms9fAkvhS+c9

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main payload

    • Matiex family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks