General

  • Target

    Halkbank_Ekstre_20230516_0819705_452378.pdf.exe

  • Size

    853KB

  • Sample

    230516-m88lyshe3w

  • MD5

    58d456f97f54cfda39bd01159fa5795c

  • SHA1

    ee224f8e2a01b12aff75c22414f835b4b530dfb0

  • SHA256

    5b67a54df45cc6e181388808f9cb35b0c2660d27b895889da37938408fe22072

  • SHA512

    736d3f96b95a268ef1bf38e17d08100209c07fc1eb82244e9aef6e574afec5c2ce004173ed3973866a037f1fe68d8a681d5c071bdd6f4c944b836fe38002cc69

  • SSDEEP

    12288:gv51Z2pNKbO4NW87Jz4XPD4ukjuZM/LBxKQIZjU:cPZ2pgbOKx4XL4MZM/LP

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot1513074805:AAE9QtTNfInovOlDzP4PcE-Ro12KxYiz9Z4/sendMessage?chat_id=1673719962

Targets

    • Target

      Halkbank_Ekstre_20230516_0819705_452378.pdf.exe

    • Size

      853KB

    • MD5

      58d456f97f54cfda39bd01159fa5795c

    • SHA1

      ee224f8e2a01b12aff75c22414f835b4b530dfb0

    • SHA256

      5b67a54df45cc6e181388808f9cb35b0c2660d27b895889da37938408fe22072

    • SHA512

      736d3f96b95a268ef1bf38e17d08100209c07fc1eb82244e9aef6e574afec5c2ce004173ed3973866a037f1fe68d8a681d5c071bdd6f4c944b836fe38002cc69

    • SSDEEP

      12288:gv51Z2pNKbO4NW87Jz4XPD4ukjuZM/LBxKQIZjU:cPZ2pgbOKx4XL4MZM/LP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks