General

  • Target

    Matrixhub.rar

  • Size

    7.5MB

  • Sample

    250108-cdjn8sypfv

  • MD5

    c7d7a0be5a634572967415ffe4d06489

  • SHA1

    bb49061b5a7d184883658ef78ff9325ef3d5ce77

  • SHA256

    90741aa99601cbe1c99695bc5e26d598d6bfe9d26e32773f5299bee3f1ecadc7

  • SHA512

    d5878c629ef06d4831765f89c4ce2caa23cb9be114290d25823bba0bd905331032c7ddf95e7a972e0bac3efbbc51cf41f067ee6b6dbf9356feb84c096296edb2

  • SSDEEP

    196608:q2DHGxIZXzLaj6n9ZXjtoWTSpjnXdeS6m+/fqINy:q2DmYXzLZ/poWWUSt+/yZ

Malware Config

Targets

    • Target

      newuimatrix.exe

    • Size

      7.6MB

    • MD5

      b18d4487b45439fe5fd09d50d9a0f351

    • SHA1

      8b355309f3108e49a5a31dacfd82874a5545460c

    • SHA256

      7eee726aa01a187ba7da7d9fe4bc05824da24dd82746b7096d6011edaac12e4e

    • SHA512

      bbbb7685a7b2ff0a6031240eb35a439252b07d814a6685041573ffcd06e8b00f87c66792793dc3727d3bfd647fe5a904adeffcf30ac3e9b756dc1230081144ae

    • SSDEEP

      196608:o2D+kdMdmwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWE:b5+3IHL7HmBYXrYoaUNL

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks