MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 27a75e446f2d1dc7c46d6b80696fdbb9fb3f70c624e9fe6ca15c517e9435e2fb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 17


Intelligence 17 IOCs YARA 5 File information Comments

SHA256 hash: 27a75e446f2d1dc7c46d6b80696fdbb9fb3f70c624e9fe6ca15c517e9435e2fb
SHA3-384 hash: 8a6124802224acbdec5426d1571a10f99c76f7ea785ae952388162b5eee9b6c01e59e3db612dbc4163393e683c206216
SHA1 hash: b060a1870bb31bdd5824a5b04169faa92116e4f2
MD5 hash: 5293e67d5def2be60ba9291f7229c619
humanhash: alanine-chicken-crazy-jig
File name:ORDER 121120.exe
Download: download sample
Signature SnakeKeylogger
File size:641'024 bytes
First seen:2025-05-23 13:22:47 UTC
Last seen:2025-06-22 11:51:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:6kqe5/miSLIPmzucRk84SQ4TuKGfM9u29nhSMwGWczmRiKZ88dE7yTmE7hlZrV:6kqm3jCuQkUQuzeOhNwGWczu/866y
TLSH T1BCD4F19C3005B84FC44786B489A0EEB46778AC9E5703C743DAD72DDBBD2D6C79A091E2
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 0040404971716800 (10 x Formbook, 9 x VIPKeylogger, 9 x SnakeKeylogger)
Reporter James_inthe_box
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
3
# of downloads :
463
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ORDER 121120.exe
Verdict:
Malicious activity
Analysis date:
2025-05-23 13:29:13 UTC
Tags:
netreactor evasion snake keylogger stealer smtp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
virus micro spam msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Launching a process
Creating a file
Сreating synchronization primitives
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
masquerade obfuscated obfuscated packed packed packer_detected vbnet
Result
Threat name:
PureLog Stealer, Snake Keylogger
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Found malware configuration
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Uses threadpools to delay analysis
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected Snake Keylogger
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1697767 Sample: ORDER 121120.exe Startdate: 23/05/2025 Architecture: WINDOWS Score: 100 19 Found malware configuration 2->19 21 Malicious sample detected (through community Yara rule) 2->21 23 Antivirus / Scanner detection for submitted sample 2->23 25 10 other signatures 2->25 6 ORDER 121120.exe 3 2->6         started        process3 file4 17 C:\Users\user\...\ORDER 121120.exe.log, ASCII 6->17 dropped 9 vbc.exe 6->9         started        11 vbc.exe 6->11         started        13 vbc.exe 6->13         started        15 2 other processes 6->15 process5
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2025-05-22 03:42:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
unc_loader_037 404keylogger
Similar samples:
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection discovery keylogger stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Uses the VBS compiler for execution
Snake Keylogger
Snake Keylogger payload
Snakekeylogger family
Unpacked files
SH256 hash:
27a75e446f2d1dc7c46d6b80696fdbb9fb3f70c624e9fe6ca15c517e9435e2fb
MD5 hash:
5293e67d5def2be60ba9291f7229c619
SHA1 hash:
b060a1870bb31bdd5824a5b04169faa92116e4f2
SH256 hash:
0656f59c9e7cfa07d64cf4cd7d85ebd9b4399893cc853f3d1d37cca622d1f815
MD5 hash:
e4a8fe009b340647108a98105600f476
SHA1 hash:
03193855202feecd4bc542876855e706a243f13b
SH256 hash:
5afe92bbe5c6fa4e9ab9322c436a7168aea07dbe0ce3f27cf174136b4f143f37
MD5 hash:
d5b2a125a0609f3a157c43bfdaaa4d05
SHA1 hash:
432407ed884600f8c444017b6ae72153185d35a6
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
d2722609b4680da309d18cc490011b8eb8fcac8e09790c5092915503bd7af376
MD5 hash:
d770c0b309e1d8b1bc73fcdd9759ff7d
SHA1 hash:
58955464f44e6746e10f13f07c1a1ce17c931ad9
Detections:
win_404keylogger_g1 snake_keylogger MAL_Envrial_Jan18_1 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_EXE_DotNetProcHook MALWARE_Win_SnakeKeylogger
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe 27a75e446f2d1dc7c46d6b80696fdbb9fb3f70c624e9fe6ca15c517e9435e2fb

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments