General

  • Target

    hesaphareketi-01.PDF.exe

  • Size

    531KB

  • Sample

    230414-grf8gsge49

  • MD5

    5b31501232583da35ea20ab826cef71c

  • SHA1

    33f1c8bc3af1f99f919f9451f19c0539f3a452ea

  • SHA256

    4ab6d78c4846a801d11c6263585e0154d8e610fcdaeb123ef91c819cc7c76cd4

  • SHA512

    9c35d03400d2e8bccfa158f066d378e9b3befae46c68164f7e69a15690e5434cfd6eefb6462415a2bbb7d374e3c529ba618de66d7f14302af8f4976ae7a9e10e

  • SSDEEP

    12288:PDXrEhB3zhZQ1FJeIYgCvZmQSIJI6nYJ6k3:PCB3zhZaeBpvVNGNE

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot5972904963:AAH_L0Z1BaWpBDyPhmUAMb5yVXWF00k11jk/sendMessage?chat_id=5334267822

Targets

    • Target

      hesaphareketi-01.PDF.exe

    • Size

      531KB

    • MD5

      5b31501232583da35ea20ab826cef71c

    • SHA1

      33f1c8bc3af1f99f919f9451f19c0539f3a452ea

    • SHA256

      4ab6d78c4846a801d11c6263585e0154d8e610fcdaeb123ef91c819cc7c76cd4

    • SHA512

      9c35d03400d2e8bccfa158f066d378e9b3befae46c68164f7e69a15690e5434cfd6eefb6462415a2bbb7d374e3c529ba618de66d7f14302af8f4976ae7a9e10e

    • SSDEEP

      12288:PDXrEhB3zhZQ1FJeIYgCvZmQSIJI6nYJ6k3:PCB3zhZaeBpvVNGNE

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks