MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 150cabd834f0db43ad531fedf436d3788b9f7365c32e7d2efebf02583a178581. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 16
| SHA256 hash: | 150cabd834f0db43ad531fedf436d3788b9f7365c32e7d2efebf02583a178581 |
|---|---|
| SHA3-384 hash: | d2bb4271adb969c22b5ea3b69b2d3e9277fd613c541ae936b941a517e1809d2397a7fae29f9e5d5092cd5b9c1283847a |
| SHA1 hash: | 1b080be709d61f2e9ba55f5aced35c1d886a82ca |
| MD5 hash: | 88fec319b45306bb6bb91d1cce4d8ad4 |
| humanhash: | early-ink-romeo-delta |
| File name: | Fatura20238278973456789055475.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 289'207 bytes |
| First seen: | 2023-02-14 09:49:06 UTC |
| Last seen: | 2023-02-14 11:40:27 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader) |
| ssdeep | 6144:tYa6ciPO8EArfqOM67PnkC4nr/uqe2u0xSsz9mb4Y/TYUPaLIP2cJAo:tYG02AbHMSP54nTuy9o4qEUyUPbAo |
| TLSH | T111541228B1A1C4E7E4A25A31997A974686F47D23346A970F37613F1C7B37251FC0AB32 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | e0c4a2a2a4bcbcf8 (15 x Loki, 12 x Formbook, 5 x SnakeKeylogger) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | pe_imphash |
|---|
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.