General

  • Target

    c4321f8a7c6225614746430b2f64998ef2bb9f4dcc94d8c5226c70c35eeb9039

  • Size

    175KB

  • Sample

    220521-b5b8ssgahj

  • MD5

    7c62cccec82695007d977aeb0049d406

  • SHA1

    427aab1aa9807f4a1b08762941c13fb2804cfeed

  • SHA256

    c4321f8a7c6225614746430b2f64998ef2bb9f4dcc94d8c5226c70c35eeb9039

  • SHA512

    4b89a3ce965c1645673396c2c5691eca6aa47f437588538e4ef0a625660064a2ed4fc258fa37947b6a236fe2f49737e39abd7a9bedfc95ecc7c0d79fc34679d3

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mmpsecurity.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    P@ss@2019

Targets

    • Target

      Payment Notification.exe

    • Size

      381KB

    • MD5

      673a1dd42a4ce1a314a1db4dcbf09a81

    • SHA1

      2fdb26d92e25c38c6300123278cbcea3be6a0ecc

    • SHA256

      684aa4d9c333d3ea5db101d239673a76f22e06ae5237ae24b00e43c55cb3b3ae

    • SHA512

      9be66fa1b076700972797c273bce0d14594fc3cc58728e0ca5552138c9dac04152470ae70d44a7c9c6dbf2b672143085134e14a9f7c6c54cce88aa2715ad6201

    • Cheetah Keylogger

      Cheetah is a keylogger and info stealer first seen in March 2020.

    • Cheetah Keylogger Payload

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks