General

  • Target

    6303866d43b6a330265ddd76b04fcde44ce7eac2c96d659587654fed44c32d1c

  • Size

    477KB

  • Sample

    241212-j5devszqdn

  • MD5

    d03f749e4ece60a93daa9cc608a41ac9

  • SHA1

    7ad996e3ae72a7099b5b851ff93b9e1634bafff4

  • SHA256

    6303866d43b6a330265ddd76b04fcde44ce7eac2c96d659587654fed44c32d1c

  • SHA512

    c62d110c7f89d67ba87f0a37215a1418a5bde6a528e99351ac9c6e7dd41a038af1ea5677c3d14a551d0fd78c66302f50ee81eadfdce9b44b813863030c3f3e89

  • SSDEEP

    12288:XUJNcWWMCd+T+Lww4H8HsqAA5eBjcap2vWIFsLTAvR:ksd/wwNHsHA5eiZHFsTAvR

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7924749806:AAG-WJhqQVHwMR7UVUYahs5tVC-3tNXnruE/sendMessage?chat_id=7009913093

Targets

    • Target

      hesaphareketi-01.pdf‮sxlx..exe

    • Size

      480KB

    • MD5

      0f8fc2216d672397def371eeec7e7ab2

    • SHA1

      878e50322452353934614f673fe08e594c278062

    • SHA256

      979c906c8edaaafe866628eca9911b766c686da4e69d899c401b0d317b4f1628

    • SHA512

      71a7508ac223d76226897d60e1be76a988348fbaa102bc29741c3df847d5d541510ac7a6ecba33afe437d6849e045463f7b53fc34a55a4c296e30b7d128b0134

    • SSDEEP

      12288:bL5HNcQWMWd+H+/wg4H+HMqAA5eJjcab2jWIFsLl6wGA:b12dtwgtHMHA5eqRHFslDGA

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks