Aman Mishra
2025-07-21 10:29:00
gbhackers.com
Researchers have uncovered a sophisticated phishing campaign zeroing in on Turkish enterprises, with a particular focus on the defense and aerospace industries.
Threat actors are masquerading as Turkish Aerospace Industries (TUSAŞ), a key defense contractor, to disseminate malicious emails that mimic legitimate contractual documents.
These emails carry a variant of the Snake Keylogger, an infamous information-stealing malware, concealed within files like “TEKLİF İSTEĞİ – TUSAŞ TÜRK HAVACILIK UZAY SANAYİİ_xlsx.exe.”
Phishing Targets Turkish Defense Sector
Upon execution, the malware deploys advanced persistence techniques, including PowerShell commands to exclude itself from Windows Defender scans and scheduled tasks for automatic startup, enabling it to harvest sensitive data such as credentials, cookies, and financial details from numerous browsers and email clients without detection.
This operation has been reported to Turkey’s National Computer Emergency Response Team (USOM), with ongoing collaborations to alert affected parties and curb further dissemination.
The malware’s file is a PE32 executable for MS Windows, with a SHA256 hash of 0cb819d32cb3a2f218c5a17c02bb8c06935e926ebacf1e40a746b01e960c68e4, and it exhibits suspicious behaviors like spawning processes via NtCreateUserProcess syscalls, including PowerShell invocations to add exclusions and schtasks.exe commands to establish persistence through XML-defined tasks in temporary directories.
Technical Breakdown of Malware Unpacking
Delving deeper into the technical intricacies, the Snake Keylogger sample, initially presenting as a benign .NET Windows Forms application named “vJfV.exe,” initializes a deceptive temperature conversion interface to mask its malicious intent.

Within its constructor, it leverages Activator.CreateInstance to instantiate a type loaded via Assembly.Load, effectively unpacking an embedded payload in memory.
This matryoshka-style layering is unpacked using tools like Chiron Unpacker, revealing the core malicious binary “jVf4P.bin” under the assembly name “Remington.”

The malware incorporates empty anti-analysis routines for virtual machines, sandboxes, Windows Defender, and Task Manager, suggesting a streamlined evasion strategy.
It systematically extracts data from email clients like Outlook, FoxMail, and Thunderbird by traversing registry keys, classifying and decrypting passwords with custom functions.
Furthermore, it targets autofill, credit card, download history, top sites, and cookie data from an extensive list of browsers, including Chrome, Firefox, Brave, Vivaldi, Microsoft Edge, and niche variants like CocCoc, Orbitum, and Comodo.
Anti-bot features check against known sandbox IP addresses, while data exfiltration occurs via configurable channels such as SMTP, FTP, servers, Telegram, or Discord.
Configuration analysis reveals DES-encrypted SMTP credentials, decrypted using Python scripts that expose details like the email “royals@htcp.homes,” server “mail.htcp.homes,” receiver “royal@htcp.homes,” and port 587.
A custom YARA rule detects the Cassandra Protector used in the sample, flagging .NET binaries with high-entropy sections, specific libraries like System.Drawing.Bitmap, and characteristic function patterns.
Additional hashes from unpacked components include Montero (3c9cddf85962249a967b3827e3edb4acb710dc0e3088c619342e2ce6df35bfbc), vJfV (82fa8156e9d4fb47cd20908818b9172f86ed13eb683041658f242c58ce0a9cff), jVf4P (2859b8700fc6111c40b806d114c43e2e3b4faa536eeab57d604818562905b911), and Captive (11f577cc6b6af304332d47fba2122ffb193e81378662ea7093ebe971107d89d6).
Defenders are urged to deploy the provided YARA rule and monitor for these indicators to preempt similar threats.
Key Indicators of Compromise (IoCs)
Indicator Type | Value |
---|---|
Filename | TEKLİF İSTEĞİ – TUSAŞ TÜRK HAVACILIK UZAY SANAYİİ_xlsx.exe |
SHA256 (Main Sample) | 0cb819d32cb3a2f218c5a17c02bb8c06935e926ebacf1e40a746b01e960c68e4 |
SHA256 (Montero) | 3c9cddf85962249a967b3827e3edb4acb710dc0e3088c619342e2ce6df35bfbc |
SHA256 (vJfV) | 82fa8156e9d4fb47cd20908818b9172f86ed13eb683041658f242c58ce0a9cff |
SHA256 (jVf4P) | 2859b8700fc6111c40b806d114c43e2e3b4faa536eeab57d604818562905b911 |
SHA256 (Captive) | 11f577cc6b6af304332d47fba2122ffb193e81378662ea7093ebe971107d89d6 |
SMTP Email | royals@htcp.homes |
SMTP Server | mail.htcp.homes |
SMTP Receiver | royal@htcp.homes |
SMTP Port | 587 |
Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.