MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a55d4ec929122952ccf0962347a5a5672a0051bcb31ead7f2c0d7df516eee6d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 0a55d4ec929122952ccf0962347a5a5672a0051bcb31ead7f2c0d7df516eee6d
SHA3-384 hash: 4319fc5b7b2723266040f99a8759c8bed5e24500d38e0ffe2d827abb3ebc9a5879c11aaa068985e7205a7e5588c77df9
SHA1 hash: ce7da59ef3c3969ae2dbbd78b7c95038756ae06b
MD5 hash: 2df63cd7bbc6a163cd7977b25e668739
humanhash: stairway-skylark-asparagus-massachusetts
File name:Purchase order.exe
Download: download sample
Signature SnakeKeylogger
File size:849'920 bytes
First seen:2023-04-04 15:22:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 12288:tiNY6oOVZd2CSUy8kPy7tE1G7ilgZ50CJ7CxG:wNSOVZd2ObkP4tEYL5T7kG
Threatray 5'052 similar samples on MalwareBazaar
TLSH T1D5054CD1F15088DAED6B06F2BD2BA53024D3BE9D94A4810C5A9D7B1766F3342209FE1F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon eeacac8cb6e2ba86 (561 x SnakeKeylogger, 142 x AgentTesla, 40 x Formbook)
Reporter abuse_ch
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
252
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Purchase order.exe
Verdict:
Malicious activity
Analysis date:
2023-04-04 15:24:54 UTC
Tags:
snake

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Lazy
Status:
Malicious
First seen:
2023-04-04 08:04:57 UTC
File Type:
PE (.Net Exe)
Extracted files:
29
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5587666659:AAG8NrrXJQs__dhk8nLJBFOspz2my8OVpX0/sendMessage?chat_id=5569775004
Unpacked files
SH256 hash:
485a969693ce5e260e1b78a7cbd288d5da743d38832f49ddfe5ccd1b0d9977bd
MD5 hash:
52fb80b37804130a1ce146d4ad82466e
SHA1 hash:
d06e5fbd1fbc2799877bbce65ea7604234639eae
SH256 hash:
c52f7e27a8815072dfba7114ed8e006242dcd6ca89b053f7d8c8f27e528a01cd
MD5 hash:
734f04a4a8654e5e4e8871de299ac635
SHA1 hash:
ae248e1c02b634ca0b9e0a23a79882a368dac389
SH256 hash:
3c507afadbb1c31a9ebdd24baac5739d47576159e01c5e84f973c951885100aa
MD5 hash:
e79bf0e7e9d52d398e0b23b352394c68
SHA1 hash:
682325763a0ec77e0fd475ea3a4021b4651eceac
SH256 hash:
0e18ed7365a1a2e0abaca27cdfdb86e35444a9132bd41eed7558ae45c6c6059a
MD5 hash:
3e64a0a320256419f9794f0ab3b24f75
SHA1 hash:
5cebe2b22d795c8ca3728160d21879409a7601a2
Detections:
snake_keylogger
Parent samples :
462999c3c88e038ecd00d8fad28c660839f9b23361fca8a5cb77aabf879bea7b
9dd7852b0af223e044c70870dc6691bf2fa26a35b738952c7f2c6a8049070d1e
1cf6ec5af4e2cf0c7bad29f2735a2db25584b153969866a74bcc323cf59a7875
1a6dcb18b2d3627d35e18aab269ababa8d2af33be25a23bfb44a4b6144816ea8
39b1f0062671054c08424c70f2251c9c1c1f43bb87f12a95a44ad3b531d2c496
d58efa16d4f119f37dc1a75b3d3b69ad93df86cc7b02280b8ea43b75e3b8d221
0402cab546c95cffedc2ab80f50749e33d027d4d25f35baa18158a88540f541b
671f0f796fe0e636ed14bda08bb4d3b5cafbe9d5b9ca1dddf929bf9fb9e3a372
fcb1853719821211d0a89b9e70cbf499eceab8d2138116b14553c61a74aae6d1
44e90dc0d1ece69f2d0c57a54984110927e97a3491ed20047963467f4edbdf1c
fde971f3c35d3955e58bbad12e7f55ec37a1655afed1af842d4eb5d32a6b4cc4
372d9f066620aa4050d10aabe89417d5d028c3fe0de5bc62bee864b1f2b18dfd
77d6ae2c1312c08d5498931b983dc91a60721f86170ace8d47f9e3e33cc6bae6
606157eb85fa1f90ad5b6def0cbddc1445298156aecb9da21bcc925e6cd7638c
67ecf11b3c85785797d599090dec86ec79cc4ce94095ad4a2cec53e15b48dc81
81ae9bcfd9a7d0e3673540a364cb8b232d857c29a84619d174a8c879d44f3604
a1b484e08d3161fa1d4f9a90c36c4e50e5c8515a3613b9d3d35bba4101e55e87
f315d7d883a82ce0b007f7f2b899047b781fa2cb5b05952e146ab679c8c64717
088c2f0914786aef4076d2c680c5d0c817696ada1f2f5a31b9e8250680f796bd
278e5ea9416fabd8821c86c7b242b9ced4a5345b79852177e2895acd5b560257
4c0851b9e5781595ccbbb892a8dcb6b6904974d412dac559de97a687fbb2a64d
29f24efe9e0ff0f013a992cabb6dd15dd0923a5541807d1e4fc541c6e1b02592
5ad97cec0cfff89e5357fe1635cc6418784ae83359f3aa2e2031c66c7ba8a1f8
41a4802d7592d29970a041b399fa9c91caac9c393a0e9353c59ca946e7ff557e
4ab665d75bc525a7bb5cffb01c28943b70fb3d4c7aceaf8a9a1bdbf1f0c7277a
e7f3e64f094d2952506148c2b0d6062a73999fb26a2eac49e6698515e3c2156e
1c97bae25b133e2b28133eb17889f3f2f063faf1003f9d575d67d16414e9a6e9
e004337426d90bd966b01fc36d2252d4b9f05dacede72ce8514540d604cf0663
0f7627d3a7392b1d6636f0c7bf6f242e0b860d45798f9eca18c2fbd815e55ebb
a3f7da2fad4025f5f0f1bd3ba1e05dc454598a98a8890aca72ed747f604203cc
559b97a856fca272b7f5891100f1317d5f4846d12e86d113c8334c9861e4b026
33a8bb74d0ef4be5a6f3845bf87f406a2b9757535a09d65e34d1c73a4b133429
af6fb4c1ccf63b051ee34879d049105a0cc2226cb6f0f03c2d1efa7a67c62a16
3a121896e1f2a3dda1daf2a56fce467abaf3bcd8f7d6ca38399e0cb1152b6f35
0a55d4ec929122952ccf0962347a5a5672a0051bcb31ead7f2c0d7df516eee6d
f0e160fc8c0dacffdd789b3a91933fd9c3d629077d25e29a4f69217220689374
da9da68aedd7dfc3cb324b9c91c2e0ce75ecb7abc0283b1aea395022f277978f
aec9db4b3d08cfbfb3731dd3ad74d19678393c35ce00655ad99ee7a2e8f0d447
05814abad81a4628904e7990185a87d6e6c55069a129f2e8cd7c2b238ce07620
ede7c3298192739d0c3188ca21b1377bffae0d2a5e7f3ce88ac10f2da8858483
d74b7b3c23e3280b35cd8c6730912b8d04412c0ed4dbc13d06182a44f38e4a69
fc3bac1e4d1fa4b617f23b4a794b011730d95c2e48d5ce2a08db522312ee0a3d
bce664433cf5bc9dd22b054ddb25edd926ba0b6124c2f5d0f99dcdcef356a715
b397cca1a04a9edb50e12c5f730cb660dff805000e6576455218dfd73a85e7f2
4a1a8fa3ff7b0bf9c376592e6335c82e99536853c0d274bce1a8443335a2cdde
eafd56c92c7688c8d00725285da67ada75e227750b9a6f5ecf6d2c0d90e8dc1e
e7ebcd95f56f4c089d56ba8519b2ef3abe3d765abbf56a9959071fe6914f16da
eb70269bb8ef78bb7c44342ed5efac0d76df99207bf45e9f9739aad5b9cf9563
06491cd2952c4f625d71050ecd36d6256cf3111de0dacd18c81aedefd8035f9e
58dda17dafc74dd89d83c27483ef35cd298a205d543bb7d1e8305d231705277b
6a6d963003f74acd86334cb97012a2bc05c2bcb0b5800f0e306b0d00287f3da8
deb8ca5cdf19882a664ed3a5e4c362ee3c2b727b0923e3d229c3a20a2b7913e5
6d79b5cb1aa503cef77ef725f7cb1980e312be3271b4e0fde0bf012c6c54becb
8b3a7d6b4cb16bcc532547df7d2940c353484cf475800be7947e66f970d1d8e4
5e120295dbb1df0ffae200b49202256cc03f6f5414addf758a4c1b11d683774d
2c5adf7282d07a8b6ac4d17affd622243faa4ada4929423654823934cfdc69bd
c70b193a2cfb726c02359b7acd2fc0d5c59986b9f24058e1f3bb37767fa944e4
SH256 hash:
53af2b8ca74d38df0312287bea5143c80d29d9cb6b409a0f2e15f5a06b976507
MD5 hash:
288c67000fa4bb5ec0354f9be23b7614
SHA1 hash:
4cd86b6d47edfdea66436fcda6e1ce0b39c5ba8b
SH256 hash:
0a55d4ec929122952ccf0962347a5a5672a0051bcb31ead7f2c0d7df516eee6d
MD5 hash:
2df63cd7bbc6a163cd7977b25e668739
SHA1 hash:
ce7da59ef3c3969ae2dbbd78b7c95038756ae06b
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Suspicious_Macro_Presence
Author:Mehmet Ali Kerimoglu (CYB3RMX)
Description:This rule detects common malicious/suspicious implementations.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe 0a55d4ec929122952ccf0962347a5a5672a0051bcb31ead7f2c0d7df516eee6d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments