General
-
Target
Hesap-Hareketleri-02052023.exe
-
Size
833KB
-
Sample
230502-jtfqvaab79
-
MD5
ed20ade737797c6335e1f87987e77e3d
-
SHA1
7acc655b4f8bfd87ebbc176dfbe44056d5228da7
-
SHA256
eafd56c92c7688c8d00725285da67ada75e227750b9a6f5ecf6d2c0d90e8dc1e
-
SHA512
beec7ca36182478d7aa42635646503a89463664ed45c3b2c21c101a624935e7c125be514e0529581e40b8dcc36cb5ea56538fd276d452c81c6cb1da8d3b72a5b
-
SSDEEP
12288:siNX6f0jNr0WMMjvd3NCxlcCuVdfuJYZY:fqoXMw3sx23P2GO
Static task
static1
Behavioral task
behavioral1
Sample
Hesap-Hareketleri-02052023.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Hesap-Hareketleri-02052023.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
snakekeylogger
https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004
Targets
-
-
Target
Hesap-Hareketleri-02052023.exe
-
Size
833KB
-
MD5
ed20ade737797c6335e1f87987e77e3d
-
SHA1
7acc655b4f8bfd87ebbc176dfbe44056d5228da7
-
SHA256
eafd56c92c7688c8d00725285da67ada75e227750b9a6f5ecf6d2c0d90e8dc1e
-
SHA512
beec7ca36182478d7aa42635646503a89463664ed45c3b2c21c101a624935e7c125be514e0529581e40b8dcc36cb5ea56538fd276d452c81c6cb1da8d3b72a5b
-
SSDEEP
12288:siNX6f0jNr0WMMjvd3NCxlcCuVdfuJYZY:fqoXMw3sx23P2GO
Score10/10-
Snake Keylogger payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-