General

  • Target

    VAKIFBANK - FAST Anlık Ödeme Bilgilendirmesi 29.09.2023 095343.img

  • Size

    1.4MB

  • Sample

    231011-gscaxsfg52

  • MD5

    6c7e07c763727ec5ebb672d742727ab8

  • SHA1

    ebcb4c102fbaedee706e8cac6714465b743c1929

  • SHA256

    f0169ffe38940b67b9642e9562e322de7564839f7a335b34605c2f8dbab73fd9

  • SHA512

    419b7fa5c3dc26085fc3a3067ce4607a241056815062802e9301916e7c671555aa11781c9c2ace2161060b9808d9fd655a1ce06a7d94ecf61926bb667c5d0787

  • SSDEEP

    12288:MmVjOxbWKVGu27Wm4XfbzsqPhxRAUwQ7xjAkZNPrApR60mR4IQfei08hTrC+iQal:MmVja2iPhhXZq60zD1himaD

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gkas.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gkasteknik@2022

Targets

    • Target

      VAKIFBAN.EXE

    • Size

      896KB

    • MD5

      e478fc4b0c1091347240550446e2f7a2

    • SHA1

      2c46e2b777dc7a29c17deaee98534069efa91586

    • SHA256

      6e9331ce6b0ef84031079cf0d10d4f09e389b29c970cbe9f6f1d683eafa9aa52

    • SHA512

      6476b53eeabeea7b97e0af0e41454ff713ba5c625ca2b8a4d211c9fb32ecca847ac85a39b28a0f5ac1a37628708df22da5aea99853b289c1bb911acc435345e3

    • SSDEEP

      12288:GmVjOxbWKVGu27Wm4XfbzsqPhxRAUwQ7xjAkZNPrApR60mR4IQfei08hTrC+iQas:GmVja2iPhhXZq60zD1himaDQ

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Detected potential entity reuse from brand microsoft.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks