General

  • Target

    c7400c649c1c3ad7a04c518c406e7bf07208c122118e840e4a91d8c99aff2373

  • Size

    189KB

  • Sample

    220521-pfqxjsfbh6

  • MD5

    fce417943d48df84b302a287d4a32f2c

  • SHA1

    fedbfb1950089469945bb9dda25b7283ca535ce1

  • SHA256

    c7400c649c1c3ad7a04c518c406e7bf07208c122118e840e4a91d8c99aff2373

  • SHA512

    55de830f36eab636213616a74ae6ce8d1963a897b2c83bb6db15734a0401f57b36f2f0635db80b61186ed6984dfbf3cb812359355817667f3dd2a09c21ffe979

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aviner.co.za
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    NoLimits@

Targets

    • Target

      Payment confirmation.exe

    • Size

      336KB

    • MD5

      6ba0cbf90fe2345758a0dd2ca208eae5

    • SHA1

      006ce0f80d66be944de8fdf28a59c39e97bd05c1

    • SHA256

      11e4751c7596400128cc3f4cdfdf1876ac917256400d42c39e651301a536de4f

    • SHA512

      343a44ef969031862c5ceaa58b9b4e12035aa518715bd95bda34a3f376d64e6fbb3b988d11cd0b4fb0abd360b6f2a51152413b5d7fea853024c8907f05b9dafe

    • Cheetah Keylogger

      Cheetah is a keylogger and info stealer first seen in March 2020.

    • Cheetah Keylogger Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks