MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24740eec512c214af4e012f2ec3bc79fdfd9912abd32b6d54b7e9ca1115407d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 15


Intelligence 15 IOCs YARA 3 File information Comments

SHA256 hash: 24740eec512c214af4e012f2ec3bc79fdfd9912abd32b6d54b7e9ca1115407d0
SHA3-384 hash: 99e07b0fd7e494af6f68ca9c1ec7bc31123ad54bad01f28f2fc9f9c3dc5ff1d3dc5b5b360df87f7a3f5b37abd1257d13
SHA1 hash: 3872d5bdd7050b29a68f4fa1f7a3181ff5fd62ef
MD5 hash: b785c92842f73d91e6f3c8f1c393aba5
humanhash: one-lithium-fruit-nevada
File name:PO-230403.exe
Download: download sample
Signature SnakeKeylogger
File size:885'760 bytes
First seen:2023-04-03 12:24:30 UTC
Last seen:2023-04-11 07:04:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'453 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 12288:PJtzLwr4rFBuzujDw0+wex5ylet/qbShPCkqd3k:waFB4ujDw0+Xdt/qbShNc
Threatray 5'043 similar samples on MalwareBazaar
TLSH T163155DD1B150889BEC6B05F2BD2BA53015A7BE9D54A4C10C5A9DBB1B76F3342209FE0F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon eeacac8cb6e2ba86 (561 x SnakeKeylogger, 142 x AgentTesla, 40 x Formbook)
Reporter abuse_ch
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
2
# of downloads :
191
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO-230403.exe
Verdict:
Malicious activity
Analysis date:
2023-04-03 12:31:34 UTC
Tags:
snake keylogger trojan evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw
Score:
100 / 100
Signature
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2023-04-03 03:10:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
32
AV detection:
18 of 36 (50.00%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU/sendMessage?chat_id=5350445922
Unpacked files
SH256 hash:
9edbd934432aec7cea74bd30ece7a1427bf698722f6777702893ff7dba3bbc76
MD5 hash:
54f348a137896af61a3600fc3afee2f8
SHA1 hash:
e17ff61c1349d8d1b0878a693380e5e4b1a70974
Detections:
snake_keylogger
Parent samples :
ad408414cfc70cdc2f0a28d95130cde8931e694f39699aa4dce91a8cc30a0897
5faf5c84d97d707f189a84dccca5a0b8fa1eb7b29d6d5b55ae442c36fd036e4e
a0b6669054d431660fa546b4daf93029d54ee64b65ea2f4443928b94099f1edd
b4d463f7b94cbcbdbe107d2ca3122ce3f0d04793f1fff3545b819698852311f7
a373532ccdd0f27818b1ab75eefe76ea788a277dcb79c019461f7991eaeb57a3
3d18203c206e8f36bf08d26ca150457d6cbd4f511d7cf4c6d3e688936f0b2767
813355fe326601b1d743b357c0a54915ce954270bf7eb9225a5cbe832c406ef8
cdc48b0fdaf20b7077c226d4b31c9d4765c985e99b8f9eea2d01676bab786f3a
485061f81c25d98b674e9031ecef0df3d18c3e353b70397e941b32783d1e5fb4
c80241ea11e21a083fc390af690cc0e6b2ee1ef91df4aaed6c44b10a753a1230
fb6cd7f254e2aef34975f6eb6c69586a7a10d059c52897221f286be3085dd5bc
c8fd56ab9f03dfe2772bc953ca3fa6dee35d7854594e194dc00cbe24f7a07a45
320e2a1e5cd7741bcec4c8f6d37527ea1905844247b1419e201104d8dd6e0fc5
c4fe62eb29c186a1455d5726899dc800964677384d47e09a2b0ba92161191ac8
f7f2e73a832d09d4ccda0e3d584eb40af695ed21726be42850f9ad0f4a4ed7dd
285442f66366aab5b789ec12e4e484b345f4c3a5e3357841507ccb0d0049ac0e
b0ceb7f37cc95869d4dbf51faa6ed5f5c2df7ac24bbba2b0f77dcca7471c9f59
f4b21e57bb6fabca1dd4b5499d5940749346c350975dcc07cf8f40db0376acfc
2ba96ffeb81c76fe74a0c12ceb229ab49654fa187e22d58dadaa443f2d4bfdd7
22312746d00896e37150b6c7ba5ad6588dd9f50e71e1e70d7745f5b820f05ff5
ae0a26ad0575bf99d4015962b33290c3bc1395b91a8355b5c9f2340fdf577db9
f218cb48273b179ab9c039a0422797a4f1a567cf893c12ce3e6d8b5bc0932b0c
24740eec512c214af4e012f2ec3bc79fdfd9912abd32b6d54b7e9ca1115407d0
94f0e85f9695ad67c878c255cf40a9ca5190b7a5178d6341d52b83813ea03d91
7083c8ed81099db6c891014f96b0a56b880ac92bcdc9c681869f74594c3a3a7b
f3d464c84f092c9d130b476fabc09c6224fb9e4a006c186a0c622d0b6b300c1c
0ec0958a4c7e436e35a3ee8c89d8b8f244189889dacf4ed86c9c2c86eb4d7bb0
5e5626f20b9483545487aabfd6744c421cf7f57da0afa01f15a9d7a7bcd41ee8
d7553cfd5b01d3836d3aa9f8bc0e2bda1efa9d6711cc9cea8d94093b64928655
36092694a2b80c584ba98d16b112b3202847072d164cdf8fdaab5c7fe2d3680c
60b3645a7d02232fd97ba076bdb88e6a801f462ce972d79366df9261a9f62720
f39c34f6567c6621290c4a7cdc7d6a436cec626f9d80aec20b508e1dc375432a
1148d4c103198f09735c2882ae5eb20e4fec6b5aa0b51c8fb83cfaf3a2b52875
45de7ab3655f4c09bbcd501ae053e80a699a507b16735d49cd4ea2185e754ab8
c73c24ee8f28c482040b1527599e0c0c3e65a93771425528ece99c48f932f1a2
519c5f8d463735bc7b6c925eba0b4e92bc49501cd7ae194e5756a988dc2c8202
caca41ded7766e3062137410ef48196855ed19f6f6f5acf7fe5a2031aea52361
ef69f6c6a455e85a49ae3de65eb978f623436b0e0620a95f55ac165955288b85
6e54bfee45fd919425b963e2a215b4f7850b38c9725cb5d799c55985096f7f89
0adef78d93aefbf2868d22e5e63265cc574c7fea255e903c0a8e936586ddaf1f
bcf7542267535648a505166fd17dad662fce6120a6b1f99635b7f406a224474a
SH256 hash:
bd71e5a036844d8db61b5eee1ca739993ad0d22853afdfd0d4267fb5158105b8
MD5 hash:
61281d563ca400cb7383529490f2587f
SHA1 hash:
5367750b03dd900a9eb83090d4822446fb1ae641
SH256 hash:
b6c7e0971df487dd0633a7008cb74377079f03897f34e7177677e83a520a6125
MD5 hash:
a86151e25a83098990f2a88486a235ed
SHA1 hash:
e2bd0eb2d8fa4a81ab3c41bed218b0cdb76f2b9f
SH256 hash:
3c507afadbb1c31a9ebdd24baac5739d47576159e01c5e84f973c951885100aa
MD5 hash:
e79bf0e7e9d52d398e0b23b352394c68
SHA1 hash:
682325763a0ec77e0fd475ea3a4021b4651eceac
SH256 hash:
779af5af9b59a994e4309b3f88d405899a46d6682b968589afa17c7c24de0839
MD5 hash:
60e96aaa4c118253a9f29a53c65e50db
SHA1 hash:
19e11da3f2ac85faab251fbbf640874d37a9b7a1
SH256 hash:
24740eec512c214af4e012f2ec3bc79fdfd9912abd32b6d54b7e9ca1115407d0
MD5 hash:
b785c92842f73d91e6f3c8f1c393aba5
SHA1 hash:
3872d5bdd7050b29a68f4fa1f7a3181ff5fd62ef
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Suspicious_Macro_Presence
Author:Mehmet Ali Kerimoglu (CYB3RMX)
Description:This rule detects common malicious/suspicious implementations.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe 24740eec512c214af4e012f2ec3bc79fdfd9912abd32b6d54b7e9ca1115407d0

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments