General

  • Target

    hareketleriniz.exe

  • Size

    63KB

  • Sample

    231101-g11y9adf33

  • MD5

    227bdbb8c34884f8dbff3a7b02a16d01

  • SHA1

    63b5aa25d682d370061df48c188083fe5de0834d

  • SHA256

    d6a06ea85b9e39e2f7ac8dacb3a3d2a410ff82a0bbd0d1d277156834e98a529a

  • SHA512

    6ef3a6aec7ab1eefd8ab3e0aa8b04c6fe7bef0d467fab2bbef3530661c21037a582ead137171817d6a2dfcd01d3b0be63556cf4baf3a46b59a37f7ae4ad994ad

  • SSDEEP

    1536:hgruVyPHmDMLKTZgVYVjvoHZ+lDpFCB0:huGMjaVToHZ+lDpFa0

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6491126749:AAEgYHjfebL8yDkuzneMucym5CaT8YIRGJE/sendMessage?chat_id=5262627523

Targets

    • Target

      hareketleriniz.exe

    • Size

      63KB

    • MD5

      227bdbb8c34884f8dbff3a7b02a16d01

    • SHA1

      63b5aa25d682d370061df48c188083fe5de0834d

    • SHA256

      d6a06ea85b9e39e2f7ac8dacb3a3d2a410ff82a0bbd0d1d277156834e98a529a

    • SHA512

      6ef3a6aec7ab1eefd8ab3e0aa8b04c6fe7bef0d467fab2bbef3530661c21037a582ead137171817d6a2dfcd01d3b0be63556cf4baf3a46b59a37f7ae4ad994ad

    • SSDEEP

      1536:hgruVyPHmDMLKTZgVYVjvoHZ+lDpFCB0:huGMjaVToHZ+lDpFa0

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks