MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8adc83591c26ae2a90982a1d19b837137d61898c2891b4b572e12804595def72. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Matiex


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 8adc83591c26ae2a90982a1d19b837137d61898c2891b4b572e12804595def72
SHA3-384 hash: 727424083d841a376a8a2dcbe30b3fa4a63687e1191e86b2fa3e90feb9559c08524668d82041a1f58b901345037e8a2a
SHA1 hash: be0d3e6dc7acd726bd3ab75fd2d72a6229d8b8f8
MD5 hash: f7a8b40a603e34ba1d54432963f39836
humanhash: delta-robert-october-chicken
File name:413110_201005200740.pdf.exe
Download: download sample
Signature Matiex
File size:141'104 bytes
First seen:2020-10-08 12:41:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'743 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 1536:KZDk1ZXVpjI5IdbylxPngMYmHxmpqF8WIdN6HOAhyDK+yJVONrw+qqXgmo2lUfk:RdfM2bgxPgMYmRE/RdEH5x+yJJmgmDJ
Threatray 3 similar samples on MalwareBazaar
TLSH 43D30672590C7E92DA780BF417332BC247B9B4820552C2FD48C97C9BB6D569E3A4B78C
Reporter abuse_ch
Tags:exe GarantiBBVA geo Matiex TUR


Avatar
abuse_ch
Malspam distributing Matiex:

HELO: hosted-by.rootlayer.net
Sending IP: 185.222.57.209
From: Garanti BBVA Internet <dekont@garantibbva.com.tr>
Subject: DEKONT
Attachment: 413110_201005200740.pdf.rar (contains "413110_201005200740.pdf.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Sending a UDP request
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun
Enabling autorun by creating a file
Result
Threat name:
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
Connects to a pastebin service (likely for C&C)
Creates an undocumented autostart registry key
Drops PE files to the startup folder
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Sigma detected: Suspicious Double Extension
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Mail credentials (via file access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses netsh to modify the Windows network and firewall settings
Yara detected Matiex Keylogger
Yara detected MultiObfuscated
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 295158 Sample: 413110_201005200740.pdf.exe Startdate: 08/10/2020 Architecture: WINDOWS Score: 100 56 srvc13.turhost.com 2->56 58 checkip.dyndns.org 2->58 60 2 other IPs or domains 2->60 80 Sigma detected: Capture Wi-Fi password 2->80 82 Yara detected Matiex Keylogger 2->82 84 Yara detected MultiObfuscated 2->84 88 10 other signatures 2->88 9 413110_201005200740.pdf.exe 17 4 2->9         started        14 413110_201005200740.pdf.exe 2 2->14         started        16 413110_201005200740.pdf.exe 2->16         started        18 413110_201005200740.pdf.exe 2->18         started        signatures3 86 May check the online IP address of the machine 56->86 process4 dnsIp5 76 pastebin.com 104.23.98.190, 443, 49727, 49739 CLOUDFLARENETUS United States 9->76 52 C:\Users\user\...\413110_201005200740.pdf.exe, PE32 9->52 dropped 54 413110_20100520074...exe:Zone.Identifier, ASCII 9->54 dropped 98 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->98 100 Creates an undocumented autostart registry key 9->100 102 Drops PE files to the startup folder 9->102 20 413110_201005200740.pdf.exe 2 9->20         started        24 WerFault.exe 23 9 9->24         started        26 timeout.exe 1 9->26         started        104 Hides threads from debuggers 14->104 28 413110_201005200740.pdf.exe 14->28         started        30 timeout.exe 14->30         started        38 2 other processes 14->38 32 413110_201005200740.pdf.exe 16->32         started        34 timeout.exe 16->34         started        78 104.23.99.190, 443, 49745 CLOUDFLARENETUS United States 18->78 36 timeout.exe 18->36         started        file6 signatures7 process8 dnsIp9 62 checkip.dyndns.org 20->62 74 3 other IPs or domains 20->74 90 Tries to steal Mail credentials (via file access) 20->90 92 Tries to harvest and steal ftp login credentials 20->92 94 Tries to harvest and steal browser information (history, passwords, etc) 20->94 96 Tries to harvest and steal WLAN passwords 20->96 40 netsh.exe 20->40         started        64 192.168.2.1 unknown unknown 24->64 42 conhost.exe 26->42         started        66 checkip.dyndns.org 28->66 68 131.186.113.70, 49746, 49747, 49750 DYNDNSUS United States 28->68 44 conhost.exe 30->44         started        70 checkip.dyndns.org 32->70 72 172.67.188.154, 443, 49766 CLOUDFLARENETUS United States 32->72 46 conhost.exe 34->46         started        48 conhost.exe 36->48         started        signatures10 process11 process12 50 conhost.exe 40->50         started       
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2020-10-08 09:48:55 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
evasion spyware stealer keylogger family:matiex persistence
Behaviour
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Modifies service
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Maps connected drives based on registry
Checks BIOS information in registry
Drops startup file
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Matiex
Matiex Main Payload
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
8adc83591c26ae2a90982a1d19b837137d61898c2891b4b572e12804595def72
MD5 hash:
f7a8b40a603e34ba1d54432963f39836
SHA1 hash:
be0d3e6dc7acd726bd3ab75fd2d72a6229d8b8f8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_matiex_keylogger_v1
Author:Johannes Bader @viql
Description:detects the Matiex Keylogger

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Matiex

Executable exe 8adc83591c26ae2a90982a1d19b837137d61898c2891b4b572e12804595def72

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments