General

  • Target

    18022025_0730_17022025_15300429772_20250121_09114163_HesapOzeti.r00

  • Size

    475KB

  • Sample

    250218-jfamnsymas

  • MD5

    692a07f1bf4ac0273d93ea1a65eef08d

  • SHA1

    25e4fbbe0760f4d238535506e99c7748c49ace5d

  • SHA256

    bd5d1006694176fd478324548c3d1b9c2cead31bc598893863d9b0cd7f5c04fe

  • SHA512

    04ee08fafe065483c27d1ab91459ea0e0285f68255747b5f5aee249ee6f80156c9a900d16ce1db5b063d94ce9ce0cd09b061ffac6b9ddb861141c2b74f073627

  • SSDEEP

    12288:bqI7Jtjlvms2s4ZJc502IKuGpICT7giqh:WI91lks8cd2KTUZh

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot7933970075:AAH-phqF2Nqha9N-SqH71iAqVTOYva6GRpE/sendMessage?chat_id=6557702940

Targets

    • Target

      15300429772_20250121_09114163_HesapOzeti.exe

    • Size

      960KB

    • MD5

      2852113f5b55c647892bcd338f1f83d9

    • SHA1

      cc1d9cb3859fa41935b4e50bc3fe3ef28166d981

    • SHA256

      fe7421156cc8170d04f7d03d2cd90ffc7fc544247502ea38f52b5437f9a99949

    • SHA512

      fec40e41a531efee64bd9af9efd6080a21c5a33d49fc5789709e1038c5a11f9f41045386c9f89310ba4d0c4eb98038be323a815011e65325b3a37e990c21226e

    • SSDEEP

      24576:Wu6J33O0c+JY5UZ+XC0kGso6FaPrJ3ayXWY:4u0c++OCvkGs9FaPwVY

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks