MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 15696d741a180dacb5b3bb87cad566b4f2ffca1df0a6673d03f9b40c71ea4def. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 14
| SHA256 hash: | 15696d741a180dacb5b3bb87cad566b4f2ffca1df0a6673d03f9b40c71ea4def |
|---|---|
| SHA3-384 hash: | 1803da3bb5020b0b1313564d1ea45b6cbcade2be4460599773c09b9a62fda859ce572e8a0cb1dcf41a1a5c1fb712bac3 |
| SHA1 hash: | a42c424b54ac462f3158eff4b873bb0b0535d58f |
| MD5 hash: | 665e0b39d01ec408f1e8f7fc1b2bec32 |
| humanhash: | single-winter-summer-lithium |
| File name: | zwqzBp3lyu3UPYc.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 678'400 bytes |
| First seen: | 2023-05-03 06:50:02 UTC |
| Last seen: | 2023-05-13 22:58:57 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:e7ni4IykaC+tMsWsNjQ9s+7LyW3avZPox1SumL:e7cd+tEqcLLyLhS1Sum |
| Threatray | 5'340 similar samples on MalwareBazaar |
| TLSH | T122E4D1A421BA8B52E03FC7F40078B85013F5716B69EEDF160E8670D95E99F503E89A4F |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | SUSP_EXE_in_ISO |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects ISO files that contains an Exe file. Does not need to be malicious |
| Reference: | Internal Research |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.