General

  • Target

    Halkbank_Ekstre_20231127_093256_734631.pdf.exe

  • Size

    643KB

  • Sample

    231127-m8jylagb47

  • MD5

    f5c860c3291dfdd1e53d616d4e237afb

  • SHA1

    c2727013047c56dc71300bd0bc7f5bc84ef5e7cb

  • SHA256

    77224cecffb3caa25a9a6da433aef450f32e9ef67af70669b4ddd7a92c24c2ca

  • SHA512

    fd7130389abf2ef10c7c33888e60838bee488a3119ca1f31915c60c9cd98baa470e64499e9b853c1af5290f4a9a83a1783877073228c3eedb915b2e70f3134b7

  • SSDEEP

    12288:nxB2Q8fm/xBew2uQAylI3ifmihK3gGuXBH19Uwd7BR6wT:nxBHxIP/zzKZuLWwpB

Malware Config

Targets

    • Target

      Halkbank_Ekstre_20231127_093256_734631.pdf.exe

    • Size

      643KB

    • MD5

      f5c860c3291dfdd1e53d616d4e237afb

    • SHA1

      c2727013047c56dc71300bd0bc7f5bc84ef5e7cb

    • SHA256

      77224cecffb3caa25a9a6da433aef450f32e9ef67af70669b4ddd7a92c24c2ca

    • SHA512

      fd7130389abf2ef10c7c33888e60838bee488a3119ca1f31915c60c9cd98baa470e64499e9b853c1af5290f4a9a83a1783877073228c3eedb915b2e70f3134b7

    • SSDEEP

      12288:nxB2Q8fm/xBew2uQAylI3ifmihK3gGuXBH19Uwd7BR6wT:nxBHxIP/zzKZuLWwpB

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks