General

  • Target

    1f9b875b2f0c513302cd7e9779e85b473ea957a7ee973023d88b0ebf74aa1dcb

  • Size

    263KB

  • Sample

    220205-wtppzaeac7

  • MD5

    430555f88cb1870e39f8d5bce5ab558d

  • SHA1

    e4774052ce8a749c42636c8c14e301a85ddf735c

  • SHA256

    1f9b875b2f0c513302cd7e9779e85b473ea957a7ee973023d88b0ebf74aa1dcb

  • SHA512

    af70c5e16b7a93337e77104fda5c7fedbc57fe0ef54519a52a0a134308044c93bd062908379784633e084e28edd15f95013ae91feff7c9e51ca9f7c930d75771

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.baconplumbing.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Andrew@1652

Targets

    • Target

      Payment Comfirmation.exe

    • Size

      379KB

    • MD5

      8cc7544c09deb420b50ef840f6f1c289

    • SHA1

      d2e1989c3efc56909510b6aec7ee20f720afb1df

    • SHA256

      cdf96811c3ce5645b19c096fa4fffca84bcb7dc4885008f83373fe580ea57f01

    • SHA512

      a211d88e815dcd246202a69b2ea8ac02ee8a6a1329eb4b4c3112e490572de9995c7ececee2239f463f5fcd90a3f9455fb98c8225b46a01dab77f661acfcc297c

    • Cheetah Keylogger

      Cheetah is a keylogger and info stealer first seen in March 2020.

    • Cheetah Keylogger Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks