General

  • Target

    5f74df0262704454d03c2c4c25313bd4fa6dc7af0d254c78d025eb98a25a395d

  • Size

    639KB

  • Sample

    241222-21x8ks1nfx

  • MD5

    dc0ed8e25f63bf8096d14a057bc2eb9a

  • SHA1

    e80f035f2275d5ec31e89aa605336e144728009f

  • SHA256

    5f74df0262704454d03c2c4c25313bd4fa6dc7af0d254c78d025eb98a25a395d

  • SHA512

    35a9b3ccab095fc043b7f12f82f0a6e0af1654d359e0bfd5cb2721c32bfd443cdc32d253074906c5b2386f5f23f5187c4ff28dad315af65d5a59037cf2b0fe81

  • SSDEEP

    12288:uU5oLiN77m7I4jWi4tWUbOZTKKNmFv9sfQqKonZu1vA7FQuZdiU2F:uU5oLSKDjOtW6OZTKKNcvUFKOZYQFd8r

Malware Config

Targets

    • Target

      5f74df0262704454d03c2c4c25313bd4fa6dc7af0d254c78d025eb98a25a395d

    • Size

      639KB

    • MD5

      dc0ed8e25f63bf8096d14a057bc2eb9a

    • SHA1

      e80f035f2275d5ec31e89aa605336e144728009f

    • SHA256

      5f74df0262704454d03c2c4c25313bd4fa6dc7af0d254c78d025eb98a25a395d

    • SHA512

      35a9b3ccab095fc043b7f12f82f0a6e0af1654d359e0bfd5cb2721c32bfd443cdc32d253074906c5b2386f5f23f5187c4ff28dad315af65d5a59037cf2b0fe81

    • SSDEEP

      12288:uU5oLiN77m7I4jWi4tWUbOZTKKNmFv9sfQqKonZu1vA7FQuZdiU2F:uU5oLSKDjOtW6OZTKKNcvUFKOZYQFd8r

    • Matiex

      Matiex is a keylogger and infostealer first seen in July 2020.

    • Matiex Main payload

    • Matiex family

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks