General

  • Target

    23393da095873755deffde7275dbd33f61b66e7e79af2ff8ee3352454c70b5d1

  • Size

    296KB

  • Sample

    220205-whsbqaebej

  • MD5

    82b886055f73aba6a42727a48c2397e1

  • SHA1

    b13e300d941e9ac25f43642c3d3b3ca55a87a928

  • SHA256

    23393da095873755deffde7275dbd33f61b66e7e79af2ff8ee3352454c70b5d1

  • SHA512

    3bce43bab8d36fce5628bcb5b952f8fc551812035594dc715235c9f6d44e253154b8f5d6f8bca5ecf8e7b5ef2f816efbe44816503f9f91a116abbaebe54a58fc

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.baconplumbing.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Andrew@1652

Targets

    • Target

      Payment relief form.exe

    • Size

      378KB

    • MD5

      d0d25ddde9388ab0feb47b9ec3cb7733

    • SHA1

      de6f89f2c17b229a0068a75bf476720a0724fe18

    • SHA256

      9e2a002527bd520f50a4844c8381e89a09e3489a239766120d63db503eb97910

    • SHA512

      25d76db3137a9ee2b0fd9a4e562a6cb89fba025a787e443f0361580b0d7fdbe43f5ebe99c204103939f01a4fedc2e1182aea90b69d3833d001141280805c386f

    • Cheetah Keylogger

      Cheetah is a keylogger and info stealer first seen in March 2020.

    • Cheetah Keylogger Payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks