MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3ae023779bcb29f75fa4eb1ad0b1c8f8dda4c8187c184d802e81e19a543e4dd9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 3ae023779bcb29f75fa4eb1ad0b1c8f8dda4c8187c184d802e81e19a543e4dd9
SHA3-384 hash: 9795f15bea1dd7bf0a1914342c1b19e68dc97435308df57d903c17f2ff203d7fe55f8681a96948e85ced08cb406707c9
SHA1 hash: 19e2c8694f04b60a5e07b175c2a498af71cc95c5
MD5 hash: 0ecbfde3c99e1c9135856f3ff325328b
humanhash: ack-hawaii-ack-colorado
File name:Swift Copy TT USDUSD$23,401.PDF.r05
Download: download sample
Signature SnakeKeylogger
File size:732'578 bytes
First seen:2025-02-06 08:19:08 UTC
Last seen:Never
File type: r05
MIME type:application/x-rar
ssdeep 12288:zsprIBYW5HibCjxqCdWOrkmUlhabZQd2TnM5CCGhogXWMzgsNJZ92eHr8g+lRaQf:oprYbi2jkC3UUud2TnIGhowdrNJBL8gG
TLSH T1D1F423E77488DCB5B98D9C8DF843434224BE17336D4418CD7AA2F7CFE2649F19A82619
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:r05 SnakeKeylogger SWIFT


Avatar
cocaman
Malicious email (T1566.001)
From: "Shah Hasan <shah.mmw@gmail.com>" (likely spoofed)
Received: "from [45.144.212.195] (unknown [45.144.212.195]) "
Date: "5 Feb 2025 23:24:21 -0800"
Subject: "Swift Advice for USD$23,401 to lgpartner.ch - 1ST transfer for 280ECH"
Attachment: "Swift Copy TT USDUSD$23,401.PDF.r05"

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
CH CH
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
virus sage msil
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.Zmutzy
Status:
Malicious
First seen:
2025-02-06 07:57:15 UTC
File Type:
Binary (Archive)
Extracted files:
31
AV detection:
12 of 38 (31.58%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

r05 3ae023779bcb29f75fa4eb1ad0b1c8f8dda4c8187c184d802e81e19a543e4dd9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments