General
-
Target
1f9b875b2f0c513302cd7e9779e85b473ea957a7ee973023d88b0ebf74aa1dcb
-
Size
263KB
-
Sample
220205-wtppzaeac7
-
MD5
430555f88cb1870e39f8d5bce5ab558d
-
SHA1
e4774052ce8a749c42636c8c14e301a85ddf735c
-
SHA256
1f9b875b2f0c513302cd7e9779e85b473ea957a7ee973023d88b0ebf74aa1dcb
-
SHA512
af70c5e16b7a93337e77104fda5c7fedbc57fe0ef54519a52a0a134308044c93bd062908379784633e084e28edd15f95013ae91feff7c9e51ca9f7c930d75771
Static task
static1
Behavioral task
behavioral1
Sample
Payment Comfirmation.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Payment Comfirmation.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
Protocol: smtp- Host:
mail.baconplumbing.co.za - Port:
587 - Username:
[email protected] - Password:
Andrew@1652
Targets
-
-
Target
Payment Comfirmation.exe
-
Size
379KB
-
MD5
8cc7544c09deb420b50ef840f6f1c289
-
SHA1
d2e1989c3efc56909510b6aec7ee20f720afb1df
-
SHA256
cdf96811c3ce5645b19c096fa4fffca84bcb7dc4885008f83373fe580ea57f01
-
SHA512
a211d88e815dcd246202a69b2ea8ac02ee8a6a1329eb4b4c3112e490572de9995c7ececee2239f463f5fcd90a3f9455fb98c8225b46a01dab77f661acfcc297c
-
Cheetah Keylogger
Cheetah is a keylogger and info stealer first seen in March 2020.
-
Cheetah Keylogger Payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-