MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3b14443c61bc3b07ef04963ce7b7d32f39a0bab1c160b633c90735e18bb9983b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 3b14443c61bc3b07ef04963ce7b7d32f39a0bab1c160b633c90735e18bb9983b
SHA3-384 hash: f373fe417ec9abd6b4346b61a72bc8f04219b6f42a9888fe4ed0fe6c220a5406cb89921c9b00b26d663a15ea800dfd6b
SHA1 hash: 48acb6c7dcb4236df532237dcff8668a42c449ae
MD5 hash: d6c183e4da547bbe6fc5703b047732dc
humanhash: queen-victor-queen-minnesota
File name:SecuriteInfo.com.Win32.PWSX-gen.11726.23332
Download: download sample
Signature SnakeKeylogger
File size:808'448 bytes
First seen:2024-02-06 09:23:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:jL+1YA2ZhLs49yJyppWk1ZF/eymbhFR+bovkD9c3h:3c2DLNqgnHX2+849cx
Threatray 5'912 similar samples on MalwareBazaar
TLSH T10C05CEF982066519C43536B8C7B353DD27BD1EEBBC02CA1A84E875B4247E3803659F9E
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
297
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Snake Keylogger
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Remcos
Status:
Malicious
First seen:
2024-02-06 07:54:17 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Snake Keylogger
Snake Keylogger payload
Unpacked files
SH256 hash:
cc669d46b728a86dcc8d91e952e7ff4520786568c8f9666aa9d375f4c4ef0045
MD5 hash:
515b025c2c8cf3e8658680b7b6913a28
SHA1 hash:
af18a023a5fd22da6d9eb4298a95501068855233
Detections:
snake_keylogger win_404keylogger_g1 MAL_Envrial_Jan18_1 MALWARE_Win_SnakeKeylogger INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_DotNetProcHook INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
SH256 hash:
b12806cfc459d707518ce982849166ca99e95df5e05d4bc7bde7d3f4942cfe0e
MD5 hash:
7c59960bd60eda6f3da4824d1dd30e5e
SHA1 hash:
ab771360df8926364dee0758a6fb6814576fd03e
SH256 hash:
2239119c7c307626633c4cb45ec492ffb16c503beb801a7e7e369af2cec6e026
MD5 hash:
c04163d2c374096a27eaf2b002d326fa
SHA1 hash:
763961bf480c02b8c558ecaf6ad387a81b7d5a4b
SH256 hash:
a3b82e2d17f660c450ba4dae95a26b906f12626462a4bb9a6c2833071dd9faf5
MD5 hash:
cf3241f04cc546fa617566e84b5c1793
SHA1 hash:
0b9cbe0c45fba268857e11ad4d71105193c19d02
SH256 hash:
3b14443c61bc3b07ef04963ce7b7d32f39a0bab1c160b633c90735e18bb9983b
MD5 hash:
d6c183e4da547bbe6fc5703b047732dc
SHA1 hash:
48acb6c7dcb4236df532237dcff8668a42c449ae
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments