MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4cfe094f83a11e6b35d11c610121f83bb28152960c775bb5c62c6e5e1af4caab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 16
| SHA256 hash: | 4cfe094f83a11e6b35d11c610121f83bb28152960c775bb5c62c6e5e1af4caab |
|---|---|
| SHA3-384 hash: | c9d41323d1090d9bff7fb1cb537746d15a25598bf1ec0a0cdb5456bea3b07e630b1aa243b17f64c60b2783f6ef63f094 |
| SHA1 hash: | ba7b45f666f7bc2381c96caf892b1a01fa2b7951 |
| MD5 hash: | aa1238f5d903f16b683f1ee60ba0e111 |
| humanhash: | oklahoma-lion-illinois-golf |
| File name: | 17476753243ac4103cae352b8f23b18793c9266db98796ad8a50f4f4535dbe231e71f20a09487.dat-decoded |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 278'016 bytes |
| First seen: | 2025-05-19 17:22:06 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 6144:ZX35R1AeWzSFzdN/T/nZMqoXV+SK/1pxHZcskZpPBpG+whbH+Cb45Qzb:h5R1AeWzSFzdN/T/nZMqoXV+SK/1pxHh |
| Threatray | 2'894 similar samples on MalwareBazaar |
| TLSH | T18344A68A6FE89810E6FF8437D2B2C015C6FD74A3462D9D2E1AD1E8153A39954CF0AF53 |
| TrID | 66.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.5% (.EXE) Win64 Executable (generic) (10522/11/4) 5.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.0% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | base64-decoded exe SnakeKeylogger |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
bd9d4a2d5627b27b2e43afd37b07ce6c6b2d64a7017def2020c2c1434eae1a2a
4cfe094f83a11e6b35d11c610121f83bb28152960c775bb5c62c6e5e1af4caab
16e98f38ce60581b593580dd757e715ae01e5127bfc357d10848542852ab8a5e
3f246886e2aa75ace2f041adcbf78ba154f2a0f259e47fbf4a4aaef7db6129aa
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
3ac4103cae352b8f23b18793c9266db98796ad8a50f4f4535dbe231e71f20a09
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.