General

  • Target

    hesaphareketi-01.PDF.exe

  • Size

    525KB

  • Sample

    230417-qvnamsga5w

  • MD5

    549fed02b6a67bb1ca8b80ce8bda0bef

  • SHA1

    0e4049cec6e24443a8ebe4e88203897b5885a474

  • SHA256

    ee79d711f50c08fc3f58d643b0974e2030d5f6f0479a5e000eaef3940f099636

  • SHA512

    ebb8c93b79b963328c3270251adeef93c5508cc55ca929c42983f3f46e35f0abb4a82deb6bdff1214eb9b28579f4fdde18c7feeb6a2ca020a627d826be3e5f20

  • SSDEEP

    12288:nqfdFI5GRF25snFrktWXBwwfTos3+eJA:qV7Rvn/2wbos9A

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6248980626:AAGb4nN3Up4r6yKEfvdHfL1IeWyHC8a-d6I/sendMessage?chat_id=5334267822

Targets

    • Target

      hesaphareketi-01.PDF.exe

    • Size

      525KB

    • MD5

      549fed02b6a67bb1ca8b80ce8bda0bef

    • SHA1

      0e4049cec6e24443a8ebe4e88203897b5885a474

    • SHA256

      ee79d711f50c08fc3f58d643b0974e2030d5f6f0479a5e000eaef3940f099636

    • SHA512

      ebb8c93b79b963328c3270251adeef93c5508cc55ca929c42983f3f46e35f0abb4a82deb6bdff1214eb9b28579f4fdde18c7feeb6a2ca020a627d826be3e5f20

    • SSDEEP

      12288:nqfdFI5GRF25snFrktWXBwwfTos3+eJA:qV7Rvn/2wbos9A

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks