General

  • Target

    Halkbank_Ekstre_20231129_532423_6373443.pdf.exe

  • Size

    577KB

  • Sample

    231130-hnm3asgh9z

  • MD5

    262b52d9590ed5c1810aea72743a52b9

  • SHA1

    1dd3ccec496afccc5da4d2d9614149d56606f050

  • SHA256

    283a23b5137c06811fc59411e30f85f91c7728528cbdad2afeb93cba0f65b598

  • SHA512

    9456a271a35a491c0eefeea4b996908f2df71818198ae31fa2719b2e77e951948a11bbde612d96639b1aa3ebbc10fe2f048e0f9c4d4d7ad0e3a19ae75b3c5cc2

  • SSDEEP

    12288:5ucopox4F9DmF2+R3NXfyKT/T0ysS07jTImEwScLzA:DeZ4hVJ190vTImEDCzA

Malware Config

Targets

    • Target

      Halkbank_Ekstre_20231129_532423_6373443.pdf.exe

    • Size

      577KB

    • MD5

      262b52d9590ed5c1810aea72743a52b9

    • SHA1

      1dd3ccec496afccc5da4d2d9614149d56606f050

    • SHA256

      283a23b5137c06811fc59411e30f85f91c7728528cbdad2afeb93cba0f65b598

    • SHA512

      9456a271a35a491c0eefeea4b996908f2df71818198ae31fa2719b2e77e951948a11bbde612d96639b1aa3ebbc10fe2f048e0f9c4d4d7ad0e3a19ae75b3c5cc2

    • SSDEEP

      12288:5ucopox4F9DmF2+R3NXfyKT/T0ysS07jTImEwScLzA:DeZ4hVJ190vTImEDCzA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks