MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 25dd001a5f16216d73a254e8ce18fbe6730d4570b5802b4c7ef7650f8fe17061. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 25dd001a5f16216d73a254e8ce18fbe6730d4570b5802b4c7ef7650f8fe17061
SHA3-384 hash: db3e0b37dc905a5c66954e278d40a8fc370cac14b78d11d75afa22b7f2c4917bc77a87554177b1aca8cf05b6341b4cb2
SHA1 hash: 2b2f3ca0bdb0d236db65b61c5dcb7afde8381426
MD5 hash: 458574f3a39585357d71c062c92ba3fa
humanhash: uniform-oranges-bluebird-nineteen
File name:04251452615625625.exe
Download: download sample
Signature SnakeKeylogger
File size:935'424 bytes
First seen:2023-04-24 07:19:09 UTC
Last seen:2023-04-24 08:01:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:dCDcEr5323hX02OkF5efVEUimFrx1fIsUU7NG6IdDyTt7PSXiuj7zTZsXxGQmDKB:dkikZtGii7PHcofwou5WPm7C/iKba
Threatray 5'177 similar samples on MalwareBazaar
TLSH T11E153C93B150C8F6D85B05F2E8AA66731C9E6E8DDCB4400D169D7FD632B3372219ED0A
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon eeacac8cb6e2ba86 (561 x SnakeKeylogger, 142 x AgentTesla, 40 x Formbook)
Reporter lowmal3
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
2
# of downloads :
285
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
04251452615625625.exe
Verdict:
Malicious activity
Analysis date:
2023-04-24 07:22:23 UTC
Tags:
evasion snake keylogger trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2023-04-24 06:31:50 UTC
File Type:
PE (.Net Exe)
Extracted files:
26
AV detection:
17 of 22 (77.27%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5478319803:AAHq9LkDUFBRvjOub4YfRlPURZxM59_BVnc/sendMessage?chat_id=5516439768
Unpacked files
SH256 hash:
a008068392d73c0efec25cab1ca843a59387ac9ababd731dc54f5907c9cb224a
MD5 hash:
6bb6365cb621b71859b6c4b2ee7d82fe
SHA1 hash:
c125a7f36626eb967d91712f107af23dcd5f82f2
SH256 hash:
96713adf11841e26cb88030f3a5499fd56e52bba8423cc30d1c9ba97e4f224ef
MD5 hash:
b02600add7f87d3fdec738224f0b392f
SHA1 hash:
86b65cb5d18cf7d817de251c2f52360888f31bb1
SH256 hash:
5e5c8fe4e53980a98b48fe6b19155edf0f0d285ed899c61dbf4f880583ddf1d2
MD5 hash:
b3bbc5461d12f07ea893bf415dfe7c89
SHA1 hash:
40c3156c471d2afe3fd88c7d20cf93e5782e1bd6
SH256 hash:
c91440edb2469965027223cb7b495166104aeaeb07e86b6eeb73e215bffd56d5
MD5 hash:
539cff103865ed7b193faa2dbe363c57
SHA1 hash:
312740e4af23757d9fa3728a5f99a5e14bddfc68
Detections:
snake_keylogger
Parent samples :
075f9863f008b047005fada351f2e8f664d3896d40d3592427c0d3c420612302
0a4d53501c98cc42bae624aad84c7344d6012942a7147d73cbdeaadd7a0b4458
53e78ca9d4a478e74ccf5473c7a2d954629c5a1839948514f557c8c360bc49c0
ae3280531b573e9950f18d0a9b42d413c02ad56bb0ce24787be51ed45671d2ad
dbc069a19fad7c07b559741c7c97893b4a530c72a95c9a19dad1081970d5b6a6
d7a7671434f14c1301598f8ce0ead55af04277ed40c15ceecefe9d1976d20a81
5b46e1ef91119e54393ac087027bd571788072dd0bfd66414967343d48e21510
9e88ee1c8b512d8a3091e3e1bd4e90bed4394129f0318b2d7c056af648ec98fb
f3927a993fa7a545f2ccbce547e0b7cd6e1c3e728b05ea5ad5d0afd1600d34f4
d3277817e3f5dd9265d3797ceb8db5316f75c7f708f9ba2186d8380c7a6530c1
99f1d0fa298d82818a7b27c95107659cff6af87ec374545cbea203e8129b9c2a
ac54d1fe3d0ff07a8342588336d7e9215cc7feb617a4abdc6afe56365938b998
3a84f34535dc71bd9e1110049d164a9153e2a08f4bc574223594c8c4e561ff51
ba24432b1bb79c4142a58c87f56b2f683319f4eec3d8cbbee26dc0cbc47b49d5
28866c34bde5da1e8e85889e6419e29a6be895334406ef8914aac18259779cd6
5d0111c7a6f285a4a74a2f504e73ec97e5f6538487e694f2297f429a3d34dcec
9be2c8ce308e2df23c299fde39f5582509c0f138e47466c18510d8e61eea9d82
91a0d70bd86208f09ad80df3816949c4b8efd73dde1a0bc885102284f59dda24
c66f9de1d4c00ed7cf572dda373abd01568a6d8a732a5763c0884d42f68d8e08
c077e2a20dd5984363120b91f3fb09983a586d86ddb401ba4414919ec023adc2
7a59016d956677cd8e7e13efcc21f7ee7fc04fc0485e8cdc164a7ac160749521
c5a9153aff97fd3982cba299d3b1fc114aee999ba0b0e39fd69b3abdeb846130
95a4f31cf9b3c1876798edc24aa9323d84e35a3c6d0fccbdde059e4062e50f78
25dd001a5f16216d73a254e8ce18fbe6730d4570b5802b4c7ef7650f8fe17061
09c411e6f6ffe9c5f7a96c431ddde7b3790cc4153918bbf1515fb0861220b5c8
40a632e7db00659b26d2006417a2fb46a916d17b6191e7ad79ff8aa877b9167a
8612a4be1e824a7d1062b9c37210e39cfd3677970b859ca80a46e8a1e7e424d2
6056bd2c5f4adeadbafa4e630874fe41cf4cce06d46a7bc68a66e91443d108bf
f21ecef6b50a540055a4b939cfc184b2dc36a3486c086e9e6bbe0e489f30f496
0bb8804c64313e1cefa0d80c2b15c21ca642094579d8ac6a8dfd84abd526eb64
cddea9876167fca2e1711072000121a4ae5423abc26c7506adc3a945954f893d
a66fe6a02551d6fe4813f4d7d9d7b5afe13d9ed94983009132535ade72bdbabc
c05e009a0ed57b473c85bb82e2a47e132426999eef14fe3523bb704dd2532fa8
12cb7bbf9a1795a33f24e45ab2147d8e1f1dbcd5d26feb6ac5a27f228bed61dc
e3b6dde19468d02fe50709de24b007fe84723c3d7bb8d3fa5db4a6d11744c4b7
f23f7ede6683e9e571279757d2a2c25493d07b2a98ab653685b4dbe93e3d1b2d
f1e1cd828f56e8ebc2fbec269ca886b2d4701ddba9bf6d76ffa318b94e897e6e
ef32afc779d1f535f073f29dc96ca6cf8dc36c1835b66017c62c8428865eef58
269d5c31e18bbd97732056de39d597525fefedb7d40968c975031e7f56e4f268
SH256 hash:
e5518e76f14e87bcc58a705c6f8f3a686cbffefc0e55985d17a067adfddf3688
MD5 hash:
920a2854e9c183ad2ef7d5543c296d38
SHA1 hash:
2c20da753bdf6f1a46261e2c132dd42f75c94229
SH256 hash:
25dd001a5f16216d73a254e8ce18fbe6730d4570b5802b4c7ef7650f8fe17061
MD5 hash:
458574f3a39585357d71c062c92ba3fa
SHA1 hash:
2b2f3ca0bdb0d236db65b61c5dcb7afde8381426
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe 25dd001a5f16216d73a254e8ce18fbe6730d4570b5802b4c7ef7650f8fe17061

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments