General

  • Target

    hesaphareketi-01.exe

  • Size

    600KB

  • Sample

    231202-t23wfsdh8x

  • MD5

    97b6f2e0e7679618b9afa0a1ec40ca57

  • SHA1

    100c6b770dc8b3da2e3e40e92855a95b7079c0e5

  • SHA256

    ef1f59cd6a322060ca09ae2611fa9be5f60469a6c1f165799f2339a98ca892e5

  • SHA512

    8f08451fb5dcff8463208024141a4b00df061d95030020a76df4dde41caaf936f09f4d153d831a4195028256bebb7db321d9f2a0d1fbf8da7bc5bd3196c3d3b7

  • SSDEEP

    12288:RZOdIGZgL4x75P1ahsQZzBPHqiaH80dhbjxf1v2Dv0QGK:HODH5PshsaPHqiI80d1jxfGvO

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ozakaluminyum.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ETKghx*c3KoQ

Targets

    • Target

      hesaphareketi-01.exe

    • Size

      600KB

    • MD5

      97b6f2e0e7679618b9afa0a1ec40ca57

    • SHA1

      100c6b770dc8b3da2e3e40e92855a95b7079c0e5

    • SHA256

      ef1f59cd6a322060ca09ae2611fa9be5f60469a6c1f165799f2339a98ca892e5

    • SHA512

      8f08451fb5dcff8463208024141a4b00df061d95030020a76df4dde41caaf936f09f4d153d831a4195028256bebb7db321d9f2a0d1fbf8da7bc5bd3196c3d3b7

    • SSDEEP

      12288:RZOdIGZgL4x75P1ahsQZzBPHqiaH80dhbjxf1v2Dv0QGK:HODH5PshsaPHqiI80d1jxfGvO

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks