General

  • Target

    NEAS.7c8bcb859a02fac81ed21586dae558efbf40cdcd993599aa8e07197a32e3155cexe_JC.exe

  • Size

    609KB

  • Sample

    231023-vyjh3sdb48

  • MD5

    8a1d7ddb598654230e512fcb726b23f3

  • SHA1

    ee500308f465b0203d0017bc0bb7f0978cafd2f5

  • SHA256

    7c8bcb859a02fac81ed21586dae558efbf40cdcd993599aa8e07197a32e3155c

  • SHA512

    c8a26e2da40566993bcdef348e59af326871cd84352b90dd366e88052757489deb64be892cb681c40b8ef587771637dc4dc1386ba2476e3e8be9a927d1d7eefe

  • SSDEEP

    12288:42WJp09SLtxWLuRFRVCy6HspkP934jLrGA:42F9qjWyRFvvNcQHG

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    egecanasansor.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    egecan1988

Targets

    • Target

      NEAS.7c8bcb859a02fac81ed21586dae558efbf40cdcd993599aa8e07197a32e3155cexe_JC.exe

    • Size

      609KB

    • MD5

      8a1d7ddb598654230e512fcb726b23f3

    • SHA1

      ee500308f465b0203d0017bc0bb7f0978cafd2f5

    • SHA256

      7c8bcb859a02fac81ed21586dae558efbf40cdcd993599aa8e07197a32e3155c

    • SHA512

      c8a26e2da40566993bcdef348e59af326871cd84352b90dd366e88052757489deb64be892cb681c40b8ef587771637dc4dc1386ba2476e3e8be9a927d1d7eefe

    • SSDEEP

      12288:42WJp09SLtxWLuRFRVCy6HspkP934jLrGA:42F9qjWyRFvvNcQHG

    • Detects Kraken family

    • Kraken

      Kraken is a keylogger that is written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks