General

  • Target

    6eb63858afa241915034f0e38ef048db360a6a1af4cd1a2f10f26de9712805c5

  • Size

    338KB

  • Sample

    220227-ezh1yadahl

  • MD5

    3e338d856b8221d6b8794d84fab44e1c

  • SHA1

    0eadb54687751cfb330ffca3f43f6f322fe34148

  • SHA256

    6eb63858afa241915034f0e38ef048db360a6a1af4cd1a2f10f26de9712805c5

  • SHA512

    ba5bc428a5c7ebe58d35abc0d429707dbadff550543e6fd16f5b80ce37dc3dda3ef90e75de31836124cc7c5a91b359c7fc6e2c14cf65e028c4ae999e79d6294c

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aviner.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    NoLimits@

Targets

    • Target

      6eb63858afa241915034f0e38ef048db360a6a1af4cd1a2f10f26de9712805c5

    • Size

      338KB

    • MD5

      3e338d856b8221d6b8794d84fab44e1c

    • SHA1

      0eadb54687751cfb330ffca3f43f6f322fe34148

    • SHA256

      6eb63858afa241915034f0e38ef048db360a6a1af4cd1a2f10f26de9712805c5

    • SHA512

      ba5bc428a5c7ebe58d35abc0d429707dbadff550543e6fd16f5b80ce37dc3dda3ef90e75de31836124cc7c5a91b359c7fc6e2c14cf65e028c4ae999e79d6294c

    • Cheetah Keylogger

      Cheetah is a keylogger and info stealer first seen in March 2020.

    • Cheetah Keylogger Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks