Phishing Attack Targeting Turkish Companies

This image is about a phishing attack targeting Turkish companies.

Phishing mail targeting Turkish companies has been detected.  Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ) is a company’s document to request pricing and packaging information from a potential supplier. This RFQ-looking file is actually a RAR file. It contains a malicious EXE file that is simply a Keylogger and Stealer. Threatmon Malware Research Team accessed the hacker’s C2 server and retrieved the stolen data.

 

FEATURES OF THE STEALER

  • Accesses sensitive information from local browsers
  • Found browser information locations related strings
  • Tries to steal browser-sensitive information -file access-
  • Tries to steal desktop applications information
  • Queries process information
  • Reads the active computer name
  • Reads the windows installation language
  • Tries to identify its external IP address by sending GET request to hxxps://checkip[.]dynds[.]org
  • Malware is from Snake Keylogger Family
  • Using Telegram as C2: hxxps://api[.]telegram[.]org/bot5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU
 

COMMUNICATING WITH THE C2 SERVER

The Stealer is using Telegram BOT API to communicate. We accessed the hacker’s C2 server and retrieved the stolen data. Here is an example:

 

More posts

This image is about monthly vulnerabilities for September 2024.
This image is about the ServiceNow data leak.
This image is about monthly vulnerabilities for July 2024.
This image is about cyber strategies for the Paris Olympics 2024.
This image is about Russian influence operations targeting the Paris Olympics 2024.
advanced divider

Share this article

Found it interesting? Don’t hesitate to share it to wow your friends or colleagues
advanced divider
Subscribe to our blog newsletter to follow the latest posts