MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 07b152394aab317e08fc56aa9fd33236cc8ea7a71d58ab9d7660ac70ccb495ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 16
| SHA256 hash: | 07b152394aab317e08fc56aa9fd33236cc8ea7a71d58ab9d7660ac70ccb495ec |
|---|---|
| SHA3-384 hash: | 4957478e0088e3e72468f313a43ecc51c78ec8f129dcf15b8707fe5896581bebf9cc21f036cc3ad7bea6ffdc9a08809e |
| SHA1 hash: | 08f6428eb528a731cfb1fd1d41753c3a1a8c95cd |
| MD5 hash: | 411d142a8ca3a8fc8d8d14b6328f2e94 |
| humanhash: | kitten-equal-delaware-snake |
| File name: | dhl formu Güncel Evrak Tamamlama TRGF8017 , 00%)09259_scan .exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 796'672 bytes |
| First seen: | 2025-06-14 13:17:29 UTC |
| Last seen: | 2025-06-16 14:09:35 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 24576:Lsf9gbyLNPt+FCUMJo3SX4CoKDs+55JnD2gtTJ7YRhN:Ut+FJMITWDsIv6gtTE |
| Threatray | 3'505 similar samples on MalwareBazaar |
| TLSH | T1F005F18423A4DA02E4BA0BF46972D33417B96E9DB912D3069EFDBCFB79377405844392 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | DHL exe SnakeKeylogger |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
5e000909af896e406ecd05a8d6a880322356ac3deb01da1f964a0bb0b225398f
47da5cfdca2ebc32d9406385b91fd6bf343bfdfb899e7ecb76dbfe6632735ada
00181f3297555dab913f5777fc7823c4882929ee81cb52430d19714b8fa85734
ce161a633b539864473065ef127ba76ce9c2202aaee184dbbee5968563462a74
156ffbc1adf860198501bf76e6428debdfa847e13e73796ee9bad6e982bf94d4
b7ca5eee2c0af78525e33094a2c1d38f639824b8f051a50216dc47417f426bba
07b152394aab317e08fc56aa9fd33236cc8ea7a71d58ab9d7660ac70ccb495ec
ecca275df0af28dbbd0b0d74c0eaf5b29194cb5293f1ccdd2ba87f203481852a
5f811f675d487ef9d0cd10ba5f095edadcb38eeeedaa5ec897b3994b954d3212
b72fd1024afa07ad46cd25049ae1ef5e7311b1b2bae35f769263332cf2e7d17d
61c3caec2a3c95494495549b3b538ddbbc3240eb794a57ac759ce4164b880734
07b152394aab317e08fc56aa9fd33236cc8ea7a71d58ab9d7660ac70ccb495ec
1826e61ce9790350a2e81f89d3dedb33b72b0a91d19907b371ea8c2a7219efe8
ea45642110816d0fb61fedc38fe846875e3d04e62ec9d88ec6854eb2b610ca69
446ac5b2673ba02db508a71c3c821a4f5b2f6d9b0f8e4af62a7b747dceae33a9
ab134fddf98394f14de58cedce0a2ab543cacfde2c2a52c8080e4dbc8d058da1
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | growtopia |
|---|---|
| Author: | Michelle Khalil |
| Description: | This rule detects unpacked growtopia stealer malware samples. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Runtime_Broker_Variant_1 |
|---|---|
| Author: | Sn0wFr0$t |
| Description: | Detecting malicious Runtime Broker |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.