MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 289dfc813d9f2a0375027fdfee69e447d46377d063c6fa72513d06a5b7898a7d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 12


Maldoc score: 9


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 289dfc813d9f2a0375027fdfee69e447d46377d063c6fa72513d06a5b7898a7d
SHA3-384 hash: 2b9843dc51047dd63f83f01345004d01e3cd438d4884b386a7f226c3015e8cbdaa9d2f4ed4b6db7a2b38c0af2750300e
SHA1 hash: c392b8d0ce62f0e2e28b0f167e434de48aaba784
MD5 hash: fbe403c0e5a47dc56baed1b17932e217
humanhash: fifteen-whiskey-eleven-apart
File name:SPE0451337.xlsm
Download: download sample
Signature SnakeKeylogger
File size:441'475 bytes
First seen:2022-04-14 05:22:47 UTC
Last seen:Never
File type:Excel file xlsm
MIME type:application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
ssdeep 12288:J4XQu7SHOCZhSTIS2dGpeWpqivD1YxR25O8Uw:XwarmMSAGMID1R5Otw
TLSH T193942304CBE19E2AAC8450B7AF14C7C450E27193A18F2D492B6CB97D70DBC6E516F9EC
Reporter abuse_ch
Tags:SnakeKeylogger xlsm


Avatar
abuse_ch
SnakeKeylogger payload URLs:
http://20.40.97.94/t7b/loader/uploads/SPE0451337.bat
http://20.40.97.94/t7b/loader/uploads/SPE0451337_Raeyddaq.bmp

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 9
OLE dump

MalwareBazaar was able to identify 8 sections in this file using oledump:

Section IDSection sizeSection name
A1531 bytesPROJECT
A289 bytesPROJECTwm
A3169 bytesVBA/Sheet1
A4368 bytesVBA/ThisWorkbook
A5171 bytesVBA/Workbook
A67 bytesVBA/_VBA_PROJECT
A7228 bytesVBA/dir
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecWorkbook_OpenRuns when the Excel Workbook is opened
IOC20.40.97.94IPv4 address
IOCcertutil.exeExecutable file name
IOCSPE0451337.batExecutable file name
IOCBpbvpfikdnwcwwscaznrExecutable file name
SuspiciousShellMay run an executable file or a system command
SuspiciousvbHideMay run an executable file or a system command
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)
SuspiciousBase64 StringsBase64-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
295
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SPE0451337.xlsm
Verdict:
Malicious activity
Analysis date:
2022-04-14 05:23:56 UTC
Tags:
macros macros-on-open loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/octet-stream
Has a screenshot:
False
Contains macros:
False
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Running batch commands by exploiting the app vulnerability
Result
Verdict:
Malicious
File Type:
Excel File with Macro
Payload URLs
URL
File name
http://20.40.97.94/t7b/loader/uploads/SPE0451337.bat
ThisWorkbook
Document image
Document image
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
certutil certutil.exe cmd macros macros-on-open
Label:
Malicious
Suspicious Score:
9.9/10
Score Malicious:
1%
Score Benign:
0%
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
IPv4 Dotted Quad URL
A URL was detected referencing a direct IP address, as opposed to a domain name.
Macro Execution Coercion
Detected a document that appears to social engineer the user into activating embedded logic.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
InQuest Machine Learning
An InQuest machine-learning model classified this macro as potentially malicious.
Document With No Content
Document contains little or no semantic information.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
88 / 100
Signature
Document contains an embedded VBA macro which may execute processes
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Suspicious Certutil Command
Sigma detected: Windows Shell File Write to Suspicious Folder
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
Threat name:
Document-Excel.Trojan.LokiBot
Status:
Malicious
First seen:
2022-04-14 05:23:08 UTC
File Type:
Document
Extracted files:
26
AV detection:
15 of 42 (35.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments