General
-
Target
f073720cea2de6afedd9ae33af93a3ea5f077034274c262d8d484e5aa68dd471
-
Size
191KB
-
Sample
220521-pdx8vaacgk
-
MD5
ff1ea4bdfbbd98c86d10ca47c0381005
-
SHA1
aa2e791bc63483a89e6d4069d508283d1a91db00
-
SHA256
f073720cea2de6afedd9ae33af93a3ea5f077034274c262d8d484e5aa68dd471
-
SHA512
fd306f088170094129d58966075e0384181d4883bdc15e56d549cfb33efeddaeb94c397ea2913f4fab95b5b5a160d59065da733d23f5c67916d716f45fc63501
Static task
static1
Behavioral task
behavioral1
Sample
Payment confirmation.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment confirmation.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.aviner.co.za - Port:
587 - Username:
[email protected] - Password:
NoLimits@
Targets
-
-
Target
Payment confirmation.exe
-
Size
340KB
-
MD5
0d93e6fe85bf79804990d42976ced9e0
-
SHA1
3d302882eceb550d7c92f042048d210fe84219e0
-
SHA256
d6de7175146f4b7d262b23adb6b14f3193fc755e10d80353a1a3cc9a164177e8
-
SHA512
0064a03bcca3b727f4425e32d6c12565c7defd6259f346d316d3f8610e0dc1b3c8cb7db0c7fb5b38725a4675734d40012eecc5cb1ee4cf9c219fffa5ff88ae41
-
Cheetah Keylogger
Cheetah is a keylogger and info stealer first seen in March 2020.
-
Cheetah Keylogger Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-