General

  • Target

    24012025_0106_23012025_Halkbank Ekstre.r00

  • Size

    516KB

  • Sample

    250124-bf55kstmhp

  • MD5

    38d3940735bdc6417aab2e3ca6898615

  • SHA1

    f37ade2fa923b9dd76a83e006fb4eb2fbaa996f5

  • SHA256

    f4cec6defabe17d2867150709adcb2e901d708a137c74849c58eaff55ea443f7

  • SHA512

    245ce330f6f193cc3a42bf169338b1f66d5e5b60e857af2eee4e3278644cf69d7137eac7f2122fa0c6d81c9e40607d4f75597d73fb89a8e707d1020a025389aa

  • SSDEEP

    12288:SEuLWwKUPAIssblTBHoLg3ymLYExsieND/bu67MPE/:ruLWuPsElTBH+gL86szRd/

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.puragenicindia.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    bobbyj2016@bobbyj2016@

Targets

    • Target

      Halkbank Ekstre.exe

    • Size

      636KB

    • MD5

      5ca0edb9c8da5f99b88f6a230a838ff7

    • SHA1

      201063e16865940a4482139c8a22a4f7728a3f7f

    • SHA256

      454cda22d2e5b8dec8f70c430c0c4cfec75b4d29885ef343e84b9a2265363601

    • SHA512

      9e587ddad60decf3e5c4254f786b231fe52fa4e26a399fd657f635525e35abf6a15b4133b1ee61a519bef3896117d357c2c6d6fea5acdd971527d5b450db086f

    • SSDEEP

      12288:+AFtkqjSR80CJK3nnh2Q6Egc5uyNT3XNzVYxk0F:+c8CJY2Q0c5uy9XvYxk

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks