MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ec0958a4c7e436e35a3ee8c89d8b8f244189889dacf4ed86c9c2c86eb4d7bb0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 0ec0958a4c7e436e35a3ee8c89d8b8f244189889dacf4ed86c9c2c86eb4d7bb0
SHA3-384 hash: 5b9ef6aa7cb5cbcfa1b96a62c47eac5d958e8420e5b613210f76cdc14ee4ce0fff12d93c7b0c6389ec3387a2096fee50
SHA1 hash: 50aaa47c9c431ee2622dee90a6c0dce83888996a
MD5 hash: ab0198bb8aa2891bdde2fb97163bb492
humanhash: solar-violet-solar-earth
File name:İŞLEM - Kredi Kartı Hesap Özeti - 45431108.exe
Download: download sample
Signature SnakeKeylogger
File size:868'864 bytes
First seen:2023-04-25 06:17:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'453 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:AI1Xr1M7hZDvqpAH1HsjuOTc3V3e7Og4:bXr1cLqmejup3V3MOg4
Threatray 5'237 similar samples on MalwareBazaar
TLSH T194055DCDF14088AAED5B45F1AD6AA63114D3AEDD54A0400C267D7B26F6BF312319FE0E
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon eeacac8cb6e2ba86 (561 x SnakeKeylogger, 142 x AgentTesla, 40 x Formbook)
Reporter abuse_ch
Tags:exe geo SnakeKeylogger TUR

Intelligence


File Origin
# of uploads :
1
# of downloads :
258
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
İŞLEM - Kredi Kartı Hesap Özeti - 45431108.exe
Verdict:
No threats detected
Analysis date:
2023-04-25 06:20:03 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Leonem
Status:
Malicious
First seen:
2023-04-24 15:40:28 UTC
File Type:
PE (.Net Exe)
Extracted files:
31
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
9edbd934432aec7cea74bd30ece7a1427bf698722f6777702893ff7dba3bbc76
MD5 hash:
54f348a137896af61a3600fc3afee2f8
SHA1 hash:
e17ff61c1349d8d1b0878a693380e5e4b1a70974
Detections:
snake_keylogger
Parent samples :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 hash:
b860be5f7233a39431970fbc196e8c872f280fec604ac045400efb1119055f54
MD5 hash:
2302f6c171a185a3918d328c9f02d8f1
SHA1 hash:
6938a2362847e4152f28ee01ca045b7b7e91daef
SH256 hash:
40c050c20d957d26b932faf690f9c2933a194aa6607220103ec798f46ac03403
MD5 hash:
c768bac25fc6f0551a11310e7caba8d5
SHA1 hash:
95f9195e959fb48277c95d1dd1c97a4edff7cb3a
SH256 hash:
5e5c8fe4e53980a98b48fe6b19155edf0f0d285ed899c61dbf4f880583ddf1d2
MD5 hash:
b3bbc5461d12f07ea893bf415dfe7c89
SHA1 hash:
40c3156c471d2afe3fd88c7d20cf93e5782e1bd6
SH256 hash:
7a2234464e9d66aa078ab594a4324a09b0fb5adeb64b080c8f91d253272b750e
MD5 hash:
bb218f47a2ab05ffd640c7e735936e9c
SHA1 hash:
103346788d80c6effcc4c4cba2fff395c9c8be0a
SH256 hash:
0ec0958a4c7e436e35a3ee8c89d8b8f244189889dacf4ed86c9c2c86eb4d7bb0
MD5 hash:
ab0198bb8aa2891bdde2fb97163bb492
SHA1 hash:
50aaa47c9c431ee2622dee90a6c0dce83888996a
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe 0ec0958a4c7e436e35a3ee8c89d8b8f244189889dacf4ed86c9c2c86eb4d7bb0

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments