General

  • Target

    ac3710ec74a9f12adeb7d84ea6a6ea512c6197d765b2aef9e87a25cbf8d6d9ab

  • Size

    497KB

  • Sample

    241213-wt6ngsylhj

  • MD5

    45f938ced699b68615db63a27bc24ae8

  • SHA1

    408156ef59bc3dc9416deec19d265f8baa232339

  • SHA256

    ac3710ec74a9f12adeb7d84ea6a6ea512c6197d765b2aef9e87a25cbf8d6d9ab

  • SHA512

    c104f08f6695a7cf65e7c7b9d72e5971d484a85ee62b66a9c2aa579cc3d7ae4e23b672335074362f2b5f81e08ec6bd6978f147d64e33549e80c51cc5333c65b3

  • SSDEEP

    12288:1C5gM8dYDtR/5rPBPXuheI43w3uXumV1S:mh8diPBPZuheI4g3aum+

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7125297965:AAFl6eQAjxqGeAfWHpfHbGAtADDAZUyFidM/sendMessage?chat_id=6367688286

Targets

    • Target

      hesaphareketi-01.pdf.exe

    • Size

      518KB

    • MD5

      60aae388f17fa2f3a35ef004304e1f77

    • SHA1

      633cb0391060b7072b85ea08641af16ea4ca37f4

    • SHA256

      3acf414852b246c2b13ce4002def7748d070bce40dc48beacc030016b9811487

    • SHA512

      fe99f74c89812209fdb33c0fb51008e41da60ed6ee7df519cbd110d38803a5bb5ded46d66bdf2923a469a71b4073dc5c53734d8d450d31b0c9a227db1ef1fc67

    • SSDEEP

      12288:kaWBJ3EjSlgM8daDFRT5rP5Pnu7eugHwLuX0mVP4:kaWBJ3Esh8d8n9P9u7eugQLa0mK

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks