General

  • Target

    7967897630af3ffc11b1669ebab53c00da22fb227904fe4496b544ce910a42cd

  • Size

    571KB

  • Sample

    241127-ramdaasnhj

  • MD5

    05981c554dbdf3fb42b0bbea0c6b50f9

  • SHA1

    a9bdef163f6228f0f6ad0e45e92daebe1e24a397

  • SHA256

    7967897630af3ffc11b1669ebab53c00da22fb227904fe4496b544ce910a42cd

  • SHA512

    6e540d2826827d1b8f2f4824f6a9409470f1d9510f881e07bea479912bebc897ebae12b6e7022b00166d739ce90570c13dca62ee33efff43dfa39c64277e1d1f

  • SSDEEP

    12288:Kcvgpb69jTOA+GnuzOPe4gx5lmFWMwybhIpl3K1LJZAy:KcvguIGnO0e15lOxal3cV

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8105461233:AAGikrL-FY3clQOY-lg3KOIDOXSLgX28_TU/sendMessage?chat_id=6147266367

Targets

    • Target

      hesaphareketi-01-27112024.exe

    • Size

      1.0MB

    • MD5

      eabd69f2c9b6aefee678ee1cffd250ab

    • SHA1

      390e5c05af37ebc6e9c89f2e24bd794af4768060

    • SHA256

      ad3059baaea15d798fc29a39b334b5be7cb27a25e7cfde3951b64220e708e3c0

    • SHA512

      6c560adfd2411854dd172825574fe96ecc9e5d7f7ee9432c22c76b25483f8aab400264b3f2009b5596f9c20b53cb0f7d4c04a5aaa4c1731be27c663ba3144a79

    • SSDEEP

      12288:ktb20Qc3lT7af41ePBRYuQLKpqeUhbTv5OFgNuPPpHSgaYPbhupl3cpLJZ0tr6A:ktb20pkaCqT5TBWgNQ7aYVYl3In+r6A

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks