General

  • Target

    hesaphareketi-01.exe

  • Size

    1.0MB

  • Sample

    241204-f9z8mszjgp

  • MD5

    0d0bddb6216fd57a6bf99daeb48470ef

  • SHA1

    1cef77c38855589143aed5d1e926ca5eee1093d4

  • SHA256

    b89fafc6badcedf8631ff505735fbcf70164d7788f6676f8c57b184e73f14d73

  • SHA512

    0104a3a2cfb2ae605916107da7a4f73dafa1a640232c096b46365f58eee04b5121d7dd7825f10c0529d57c9cb9c5e7b6b611309e4dbfe35f0b117a18aadec912

  • SSDEEP

    24576:vu6J33O0c+JY5UZ+XC0kGso6FaarmFMrdIbCWY:Zu0c++OCvkGs9FaarFrdcY

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      hesaphareketi-01.exe

    • Size

      1.0MB

    • MD5

      0d0bddb6216fd57a6bf99daeb48470ef

    • SHA1

      1cef77c38855589143aed5d1e926ca5eee1093d4

    • SHA256

      b89fafc6badcedf8631ff505735fbcf70164d7788f6676f8c57b184e73f14d73

    • SHA512

      0104a3a2cfb2ae605916107da7a4f73dafa1a640232c096b46365f58eee04b5121d7dd7825f10c0529d57c9cb9c5e7b6b611309e4dbfe35f0b117a18aadec912

    • SSDEEP

      24576:vu6J33O0c+JY5UZ+XC0kGso6FaarmFMrdIbCWY:Zu0c++OCvkGs9FaarFrdcY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks