General

  • Target

    matcha.exe

  • Size

    7.1MB

  • Sample

    250118-yacx6s1rgt

  • MD5

    0203b66c50fcda6ab03d559641782548

  • SHA1

    cb83ab81c3d4e86b7adad7f114e6186dfd1e6c72

  • SHA256

    e0051ec0211d9c8090d3a63038d74863094618a8e971ff1efc6ebf939615e8f4

  • SHA512

    38f5dd652c4e9317d4dc52bc8e1408974b0bad17cebe9d6fd82661c881d4c82039d45ae42c4b051aa8a5dc781b4ae4adbbcb7bf52b8c486de3bc99191b669bc7

  • SSDEEP

    98304:9DCIfhvpj/q5MD/x/0feyGgatbQ940BDlgwdnpka9R/k9t+2SzIrzUGt+EtMJbF2:9GOpj/bDfyGgqwBdnpkYRMsc8hJpWR19

Malware Config

Targets

    • Target

      matcha.exe

    • Size

      7.1MB

    • MD5

      0203b66c50fcda6ab03d559641782548

    • SHA1

      cb83ab81c3d4e86b7adad7f114e6186dfd1e6c72

    • SHA256

      e0051ec0211d9c8090d3a63038d74863094618a8e971ff1efc6ebf939615e8f4

    • SHA512

      38f5dd652c4e9317d4dc52bc8e1408974b0bad17cebe9d6fd82661c881d4c82039d45ae42c4b051aa8a5dc781b4ae4adbbcb7bf52b8c486de3bc99191b669bc7

    • SSDEEP

      98304:9DCIfhvpj/q5MD/x/0feyGgatbQ940BDlgwdnpka9R/k9t+2SzIrzUGt+EtMJbF2:9GOpj/bDfyGgqwBdnpkYRMsc8hJpWR19

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      ���x%�.pyc

    • Size

      857B

    • MD5

      43203ef4d606ed1d855b5492fdfab633

    • SHA1

      46be510ef4969b3727696d328e418a54c4ee8ab8

    • SHA256

      9bd3b4b2e3edf82220e4894bc431871eb74940092cedfe81b98b156fba193750

    • SHA512

      457cc3aaa123e938b8462c97d52239940be499319b9f9656ddecfe746ac93cb41d0d8a36d02e4ff5ac645911e16b51a197d38c0519d354ad1a10d4c524713709

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks