General

  • Target

    hareketleriniz .pdf.exe

  • Size

    119KB

  • Sample

    231102-se6hdsdf5s

  • MD5

    ac17552680ce92bcdeee8d85dd23a094

  • SHA1

    3834e08df86667af59ca7ca77be8536063fb490c

  • SHA256

    5c046d79136779c5d2d1093a0ae1b45a61f4d49b0f8b8947e18bfccee2806559

  • SHA512

    0998215bf514c7aa6d0c664d78f19bbeb17686109bae943f0921d7323492bcfd796b131061a251303e970b2a60640d242555beeffec55bde2b542ad961b69dd6

  • SSDEEP

    3072:pNAUxwbSVwS03k/oej4T5zYQxwNc1xNUPBC1C:pSU2bSVwrU/oeaYQxwNc1xKk1

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot6581815121:AAHhziZ2mQS5qcx02h_Vx6A5dDt8ehDjIWw/sendMessage?chat_id=5262627523

Targets

    • Target

      hareketleriniz .pdf.exe

    • Size

      119KB

    • MD5

      ac17552680ce92bcdeee8d85dd23a094

    • SHA1

      3834e08df86667af59ca7ca77be8536063fb490c

    • SHA256

      5c046d79136779c5d2d1093a0ae1b45a61f4d49b0f8b8947e18bfccee2806559

    • SHA512

      0998215bf514c7aa6d0c664d78f19bbeb17686109bae943f0921d7323492bcfd796b131061a251303e970b2a60640d242555beeffec55bde2b542ad961b69dd6

    • SSDEEP

      3072:pNAUxwbSVwS03k/oej4T5zYQxwNc1xNUPBC1C:pSU2bSVwrU/oeaYQxwNc1xKk1

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks