General
-
Target
hesaphareketi-01.PDF.exe
-
Size
525KB
-
Sample
230417-qvnamsga5w
-
MD5
549fed02b6a67bb1ca8b80ce8bda0bef
-
SHA1
0e4049cec6e24443a8ebe4e88203897b5885a474
-
SHA256
ee79d711f50c08fc3f58d643b0974e2030d5f6f0479a5e000eaef3940f099636
-
SHA512
ebb8c93b79b963328c3270251adeef93c5508cc55ca929c42983f3f46e35f0abb4a82deb6bdff1214eb9b28579f4fdde18c7feeb6a2ca020a627d826be3e5f20
-
SSDEEP
12288:nqfdFI5GRF25snFrktWXBwwfTos3+eJA:qV7Rvn/2wbos9A
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.PDF.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.PDF.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot6248980626:AAGb4nN3Up4r6yKEfvdHfL1IeWyHC8a-d6I/sendMessage?chat_id=5334267822
Targets
-
-
Target
hesaphareketi-01.PDF.exe
-
Size
525KB
-
MD5
549fed02b6a67bb1ca8b80ce8bda0bef
-
SHA1
0e4049cec6e24443a8ebe4e88203897b5885a474
-
SHA256
ee79d711f50c08fc3f58d643b0974e2030d5f6f0479a5e000eaef3940f099636
-
SHA512
ebb8c93b79b963328c3270251adeef93c5508cc55ca929c42983f3f46e35f0abb4a82deb6bdff1214eb9b28579f4fdde18c7feeb6a2ca020a627d826be3e5f20
-
SSDEEP
12288:nqfdFI5GRF25snFrktWXBwwfTos3+eJA:qV7Rvn/2wbos9A
-
Snake Keylogger payload
-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-