MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 269d5c31e18bbd97732056de39d597525fefedb7d40968c975031e7f56e4f268. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 269d5c31e18bbd97732056de39d597525fefedb7d40968c975031e7f56e4f268
SHA3-384 hash: b94410b15be60c0143a74f2bbed50d76bf29f885fd4122779d22b2a73cad0f3f9b67ba9d9d4778da8bc11b2e7e2f10a8
SHA1 hash: d8ba9d5ce929348922944906893955c3469e0bda
MD5 hash: 9d676ec1207242931c80df7a8dc92aef
humanhash: music-west-music-enemy
File name:e-dekont.exe
Download: download sample
Signature SnakeKeylogger
File size:958'976 bytes
First seen:2023-05-30 07:56:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:KsIdup1lmFxU3Z5XINqaToiVmx3sWXF8G:jTmFxUp5Y7oiVmVs
Threatray 5'518 similar samples on MalwareBazaar
TLSH T1EA155ED1F19088DAE97B06F16D2B953014A7BE9D54B4810D5A9ABB1B36F3302209FF1F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon eeacac8cb6e2ba86 (561 x SnakeKeylogger, 142 x AgentTesla, 40 x Formbook)
Reporter abuse_ch
Tags:exe geo SnakeKeylogger TUR

Intelligence


File Origin
# of uploads :
1
# of downloads :
259
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e-dekont.exe
Verdict:
Malicious activity
Analysis date:
2023-05-30 08:09:25 UTC
Tags:
evasion snake keylogger trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Forced shutdown of a browser
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.FormBook
Status:
Malicious
First seen:
2023-05-29 09:04:12 UTC
File Type:
PE (.Net Exe)
Extracted files:
28
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5478319803:AAHq9LkDUFBRvjOub4YfRlPURZxM59_BVnc/sendMessage?chat_id=5516439768
Unpacked files
SH256 hash:
254518172e033d74a84f6abae850a1baf7234132442ab42efc2ae6b230cd8c6b
MD5 hash:
9df5702cfbf66cd5656bbecb213d2e9b
SHA1 hash:
e1fdaff0ab47867fd9322aabb7557a4056bd3bef
SH256 hash:
96ca2fef72b35b9860d1c0d152247a07f1a9604d299ed90c366019434fb2e54c
MD5 hash:
8ef9e0ed49cb0f3db49c41e02033c870
SHA1 hash:
9ddafd8fa4751d25b59c208a2cca2e458e3cb0f8
SH256 hash:
16c255190eaaf1b60ec7d07abcac5f614ea197cee2416ca9d01bb563c526c87d
MD5 hash:
fb4ed205b442f470bbf10913128efdcb
SHA1 hash:
9a0a4c5ae429769e3253a9a3daefa24270b87a5b
SH256 hash:
0b861d0e19d173621dba77fc3954b6325b3e89e0856817eb9ac1b0e4b4b6f9a0
MD5 hash:
34e9924238cc9c184aed0f7e0dd905ab
SHA1 hash:
42e0e3852a327ae2d232858ba41fca9cadd628db
SH256 hash:
c91440edb2469965027223cb7b495166104aeaeb07e86b6eeb73e215bffd56d5
MD5 hash:
539cff103865ed7b193faa2dbe363c57
SHA1 hash:
312740e4af23757d9fa3728a5f99a5e14bddfc68
Detections:
snake_keylogger
Parent samples :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 hash:
269d5c31e18bbd97732056de39d597525fefedb7d40968c975031e7f56e4f268
MD5 hash:
9d676ec1207242931c80df7a8dc92aef
SHA1 hash:
d8ba9d5ce929348922944906893955c3469e0bda
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments