Snake Keylogger Evades Windows Defender and Exploits Scheduled Tasks to Harvest Credentials

A newly identified phishing campaign is taking aim at Turkish enterprises, with a sharp focus on those in the defense and aerospace industries.

Threat actors have been observed distributing weaponized emails masquerading as official correspondence from Turkish Aerospace Industries (TUSAŞ), a flagship defense contractor.

The emails deliver cleverly disguised malicious executables, most notably in the form of “TEKLİF İSTEĞİ – TUSAŞ TÜRK HAVACILIK UZAY SANAYİİ_xlsx.exe,” directly mimicking contractual file exchanges.

Behind this façade lies a variant of the notorious Snake Keylogger, an information-stealing malware designed to compromise business-critical data while evading traditional security controls.

Deceptive Delivery

Upon execution, the malicious file is revealed to be a PE32 .NET assembly engineered for Windows platforms.

Notably, the implant employs matryoshka-like layered loading, dynamically unpacking and running secondary payloads directly in memory to frustrate static analysis.

The initial artifact presents as a benign temperature conversion utility, but this is simply a cloak for the loader.

Snake Keylogger
Detect It Easy result

Runtime analysis with dnSpy uncovered that the main executable dynamically loads an obfuscated resource using .NET’s Assembly.Load and Activator.CreateInstance mechanisms, with the true malicious code hidden from plain sight.

Leveraging advanced anti-detection mechanisms, the sample attempts to ensure its persistence and stealth.

Analysis reveals it spawns PowerShell commands that explicitly add the malicious executable to Windows Defender’s exclusion list, shielding it from Microsoft’s default endpoint protection.

Furthermore, it creates a scheduled task via schtasks.exe, registering itself for automatic execution at system startup guaranteeing the attacker’s foothold survives reboots.

Such persistence tactics, combined with attempts to evade detection and analysis tools, underscore the sophistication of the operation.

In-Depth Data Theft

Once established, the malware rapidly pivots to credential harvesting. It systematically targets a broad spectrum of browser-based storage locations, extracting autofill data, passwords, cookies, download histories, and stored credit card details from popular web browsers such as Chrome, Edge, Firefox, and many regionally favored Chromium forks.

Additionally, the malware hunts for credentials from mail clients including Outlook, FoxMail, and Thunderbird, even probing Windows Registry keys for sensitive configuration data, which it then decrypts using custom routines.

Interestingly, many anti-analysis routines meant to detect virtual machines, sandboxes, and popular debugging tools are present in the code, but remain stubs presumably left blank to reduce the risk of detection or due to sample adaptation for targeted attacks.

Exfiltration of harvested data is performed through multiple channels, with SMTP-based communication observed as the primary vector in this sample.

Configurations and credentials for SMTP exfiltration are embedded in the binary, protected with DES encryption; researchers were able to extract and decrypt these settings, revealing attacker-controlled infrastructure masked behind the guise of legitimate cloud email services.

The ongoing attack campaign has prompted formal incident reporting to Turkey’s National Computer Emergency Response Team (USOM).

Sector-wide notifications and technical advisories are being distributed to highlight the threat and support containment.

Technical defenders are encouraged to use the provided YARA rules targeting improbable resource section entropy and .NET artifact patterns to proactively detect suspicious executables also utilizing the Cassandra Protector packer.

Indicators of Compromise (IOCs)

FilenameSHA256
TEKLİF İSTEĞİ – TUSAŞ TÜRK HAVACILIK UZAY SANAYİİ_xlsx.exe0cb819d32cb3a2f218c5a17c02bb8c06935e926ebacf1e40a746b01e960c68e4
Montero3c9cddf85962249a967b3827e3edb4acb710dc0e3088c619342e2ce6df35bfbc
vJfV82fa8156e9d4fb47cd20908818b9172f86ed13eb683041658f242c58ce0a9cff
jVf4P2859b8700fc6111c40b806d114c43e2e3b4faa536eeab57d604818562905b911
Captive11f577cc6b6af304332d47fba2122ffb193e81378662ea7093ebe971107d89d6

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here