MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4621513698be229fad9c0110d78e90bc26cafce628af0a436c32934c862ded57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 17
| SHA256 hash: | 4621513698be229fad9c0110d78e90bc26cafce628af0a436c32934c862ded57 |
|---|---|
| SHA3-384 hash: | 5ae3f62031653eb822d673f539264eba540f2a0e5adeb8d95fedf326ee1fa55b369d1cb3771f17381ba96eab7bb15def |
| SHA1 hash: | 1f0ffd3b17d75e2cabed9c451bc86f9dd18382e2 |
| MD5 hash: | 887add07c29e19f32096f9031093451e |
| humanhash: | nine-golf-east-mockingbird |
| File name: | RFQ 50000 - Saudi Arabia.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 287'921 bytes |
| First seen: | 2023-02-07 08:01:45 UTC |
| Last seen: | 2023-02-07 09:37:01 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader) |
| ssdeep | 6144:PYa6F0uj7Ou4wn+kaxNmcxWG8OO8GiXuB/GPrpLAoSC:PYv0uyw+kaxNqG818WB/Y+S |
| Threatray | 11'028 similar samples on MalwareBazaar |
| TLSH | T1F3541210BAE4D847E9A21E71213C8316CFF8AC2748AD128F23606F1DF677AD1D91E761 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
d6a66b5409b3d4ddcb047f042b74e98223956353c0e437b502fd4b4e7ae166e2
c3ed1c311993662c40a4a9637cdd15f6c4b21f967b5a0336e3ddf25ada24e0a9
8b1b5fea910a93b2ac0a5a245e21796e1cda2bf180e665419ca369d167775552
d2c1dc0832f21d13b47193d5521a124b87026422e11bb0f99ee8d07a9f16be50
081c74eaa0425a920ffc337c6113b4106c8dbd527730adc49e8b819de6579988
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | pe_imphash |
|---|
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.