MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45de7ab3655f4c09bbcd501ae053e80a699a507b16735d49cd4ea2185e754ab8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 15


Intelligence 15 IOCs YARA 3 File information Comments

SHA256 hash: 45de7ab3655f4c09bbcd501ae053e80a699a507b16735d49cd4ea2185e754ab8
SHA3-384 hash: 500f29782ded4c9e9e085c5f18a63439c81d4cf6ca99598f7209fc519b8b1644ed12d66232cb354a781e43e0b7ed5ad8
SHA1 hash: efae1107939d452c99fb9a947ad4288153c22c82
MD5 hash: 06b7d19d810b734f9b39c4f7aca26e1d
humanhash: crazy-july-oven-timing
File name:RFQ-202303.exe
Download: download sample
Signature SnakeKeylogger
File size:974'848 bytes
First seen:2023-05-03 07:01:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 12288:Dzni4Iy3Qj0Iab+0q7crBSYGO+01478BpRnisF:DzUds4eBnq7uis
Threatray 5'340 similar samples on MalwareBazaar
TLSH T1BE254CD1B1A08A96E87B47F16C3AB53012E37D9D54E4C10C5A9AB7D66AF3341209FE0F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon eeacac8cb6e2ba86 (561 x SnakeKeylogger, 142 x AgentTesla, 40 x Formbook)
Reporter spatronn2
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
393
Origin country :
TR TR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ-202303.exe
Verdict:
Malicious activity
Analysis date:
2023-05-03 07:04:18 UTC
Tags:
snake keylogger trojan evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys comodo lokibot packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-05-03 06:41:15 UTC
File Type:
PE (.Net Exe)
Extracted files:
43
AV detection:
21 of 36 (58.33%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5310184099:AAGxqu0IL8tjOF6Eq6x2u0gfcHhvuxRwfLU/sendMessage?chat_id=5350445922
Unpacked files
SH256 hash:
9edbd934432aec7cea74bd30ece7a1427bf698722f6777702893ff7dba3bbc76
MD5 hash:
54f348a137896af61a3600fc3afee2f8
SHA1 hash:
e17ff61c1349d8d1b0878a693380e5e4b1a70974
Detections:
snake_keylogger
Parent samples :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 hash:
b0efadbda6654d69d12cc15d20f89e204b46109ddf605f956e4a099c3521fbf5
MD5 hash:
254ae52912ce9b45d39ad907f47c11d8
SHA1 hash:
52c7c1f02bff22865bcacd21d6314d13d4ca373a
SH256 hash:
8c52d8c5771406a57a967e859d0fe9c8310b3129622fadcce66da76e3159ad42
MD5 hash:
b29ba633989c85aad6126fa4bcbce3a4
SHA1 hash:
e9b572da5bda42efc2947407e43a40a9367fc25c
SH256 hash:
21bade105435a593344a15035866160bfc9a4758b8ee804fec5976f2f549499e
MD5 hash:
8a953f66bbca4d9150b25c53c03e7631
SHA1 hash:
8e2ef1a59931d56acdbeb02dce84928c44ee0e48
SH256 hash:
e5518e76f14e87bcc58a705c6f8f3a686cbffefc0e55985d17a067adfddf3688
MD5 hash:
920a2854e9c183ad2ef7d5543c296d38
SHA1 hash:
2c20da753bdf6f1a46261e2c132dd42f75c94229
SH256 hash:
45de7ab3655f4c09bbcd501ae053e80a699a507b16735d49cd4ea2185e754ab8
MD5 hash:
06b7d19d810b734f9b39c4f7aca26e1d
SHA1 hash:
efae1107939d452c99fb9a947ad4288153c22c82
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments