General

  • Target

    sipariÅŸ UTR01072410 - EuroCRSP0177462 fiyat teklifi.exe

  • Size

    536KB

  • Sample

    240912-mf1ewasapj

  • MD5

    9bb08c09b097d1a6b0238bb51665bf9b

  • SHA1

    4f7c6e74a7bbf4e268f9dc1496fa1ab8a4a89bd2

  • SHA256

    4c64661e56eb8bea2cfeb88042c1fcc29dd8b83320b59a3d06986a2c359707fb

  • SHA512

    b6b758b1df5882d2d30c6c62ba9d209d580ccd91eab9ab66f1d99c4b17cf4da2796675e1914d8404c1c932c61e130f2bdc092c55bfa95de1aefb759fa9a4e027

  • SSDEEP

    12288:hYE21jQXrpLJ0G5FWbi4qoCYmi4df8FnLAcXHZ:P4jQXlLtUmF86c

Malware Config

Targets

    • Target

      sipariÅŸ UTR01072410 - EuroCRSP0177462 fiyat teklifi.exe

    • Size

      536KB

    • MD5

      9bb08c09b097d1a6b0238bb51665bf9b

    • SHA1

      4f7c6e74a7bbf4e268f9dc1496fa1ab8a4a89bd2

    • SHA256

      4c64661e56eb8bea2cfeb88042c1fcc29dd8b83320b59a3d06986a2c359707fb

    • SHA512

      b6b758b1df5882d2d30c6c62ba9d209d580ccd91eab9ab66f1d99c4b17cf4da2796675e1914d8404c1c932c61e130f2bdc092c55bfa95de1aefb759fa9a4e027

    • SSDEEP

      12288:hYE21jQXrpLJ0G5FWbi4qoCYmi4df8FnLAcXHZ:P4jQXlLtUmF86c

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks