General
-
Target
matrix.rar
-
Size
14.9MB
-
Sample
241210-pgzwvazphp
-
MD5
f3ebafa286fd6e1decf2cc882c03e9bf
-
SHA1
f4c8f5a0071346acc1ab98d605e6c07ec8d69c63
-
SHA256
1a50b823f71c6b2d20ef8114aeafb5c2e426121d8fb3fed78c1de8b3a53ef497
-
SHA512
092893d326273636de3cf4b50aaf10ff547cbe33d65cfafba7d7f70a7b4e19ca854adec08b9bd83c57d1a73aef10ed340ffd6c775f8bba6774aa4b8b6be1dde1
-
SSDEEP
393216:Lj+gCZvxDjHjSc7KHTvWDj+gCZvxDjHjSc7KHTvWv:PGVVjHjSqKzvWHGVVjHjSqKzvWv
Behavioral task
behavioral1
Sample
matrix/newuimatrix.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
matrix/newuimatrix.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
matrix/olduimatrix.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
matrix/olduimatrix.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
matrix/newuimatrix.exe
-
Size
7.6MB
-
MD5
f4f26680c7aed442b3a8e99e2b3c4190
-
SHA1
dd22f527c0d90f971e4365ea403f3bdaeef035c3
-
SHA256
85b04c1a686fc8a8a55bdaa043e20cd42ed775cf8ba6039346721324b83f409f
-
SHA512
8b42f71571a93d95cfe12ffae40e3226e219f10b82a1d5c195073c6ba8880c5781f92ffddabf601c6c5c4df12b1c5e2066db07c12a47631ee1a9926efa784ee5
-
SSDEEP
196608:RrD+kdlPwfI9jUCBB7m+mKOY7rXrZusoSDmhfvsbnTNeWl:t5wIHL7HmBYXrYSaUNv
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
matrix/olduimatrix.exe
-
Size
7.6MB
-
MD5
f4f26680c7aed442b3a8e99e2b3c4190
-
SHA1
dd22f527c0d90f971e4365ea403f3bdaeef035c3
-
SHA256
85b04c1a686fc8a8a55bdaa043e20cd42ed775cf8ba6039346721324b83f409f
-
SHA512
8b42f71571a93d95cfe12ffae40e3226e219f10b82a1d5c195073c6ba8880c5781f92ffddabf601c6c5c4df12b1c5e2066db07c12a47631ee1a9926efa784ee5
-
SSDEEP
196608:RrD+kdlPwfI9jUCBB7m+mKOY7rXrZusoSDmhfvsbnTNeWl:t5wIHL7HmBYXrYSaUNv
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3