General

  • Target

    12102023_1210_11102023_Hesap hareketleriniz pdf.gz

  • Size

    17KB

  • Sample

    231012-eq7ypsdh8v

  • MD5

    b2691e370f9e9ed7cffb240898ca7d52

  • SHA1

    a4c7be14f3dc747a3a2f44e36eb0a81e06e05629

  • SHA256

    40121dab1b7d4c35bf611f6dcd58bc55c73823b6eaa06cf6323803117006887e

  • SHA512

    c65e8e89a0dcef783e5fb19a8e55554619780f1334e9e733ad30c16a54c0ac3223d58f9ae8f4e60d1765238ad61d9d6bbc4604c70fbdcb94275f64d8e00a8832

  • SSDEEP

    384:jrdlu8we/yJVqgkgOI6+oSWP9VDAflPrvFqXSc3BVT0I2Q:jrbknqgkgbhoNcVNqXSwF

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6675876060:AAEydIMROdr0XsdBN7fk_mjJRQvyv_ectv4/sendMessage?chat_id=5262627523

Targets

    • Target

      Fnjnpedy.exe

    • Size

      32KB

    • MD5

      61a347aa80bae20fc5908ae86f8790ad

    • SHA1

      2163cacdcb0b91e2a4c4cb2e2e021d6148961854

    • SHA256

      41ccb4c165200571b2d10047d7e25c85e7a270c2bb6c3438c7f8edce7dc2fc9c

    • SHA512

      e1cfd42004c0c1c32af49632769ba84dd93c128e210ced9f47fffbbd3f1324885e4d830b90432c83082c17c44ada91878c33585bdd5cb27c3b47486ae9ecd30c

    • SSDEEP

      384:LzsL/CyUCVnCMr2jEKqv++7Jk+qY/sgKwLF12APL6yRqtxAx+roEOPVK/KO+zB6a:aUCVCMrJJd5pRKs3RqtGx+roLYP+ka

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks