MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4f4f4416f9a2e28040ff4feda375eb9ac680553dc45ff30fee71799ea6c19d7b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 19
| SHA256 hash: | 4f4f4416f9a2e28040ff4feda375eb9ac680553dc45ff30fee71799ea6c19d7b |
|---|---|
| SHA3-384 hash: | 109924dfb5ee0a1739011a6461fbf4e37733e3ba6262d942b9627be4490b5152e0f2d9921b1cb2757625905bfbd99bc4 |
| SHA1 hash: | fd95f1a7a6cf688656030b3560e3909803c88685 |
| MD5 hash: | fd3794fff9288f6505ce359f5af187b5 |
| humanhash: | johnny-robert-floor-wolfram |
| File name: | SOA.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 601'600 bytes |
| First seen: | 2025-09-29 18:43:40 UTC |
| Last seen: | 2025-10-06 10:40:10 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'597 x Formbook, 12'241 x SnakeKeylogger) |
| ssdeep | 12288:3CcF+psrpLh6jvqRF33kmJq5DgNMuhkUuw4c:ZpLpRXoONbrV |
| TLSH | T185D4F15423BEFF03E0A65BF85830D33547B5AD98B812D3464EFAACEBB835B406954643 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
0526512d371c65de3cea8edd1c0f405f914c2c1dcd87df2740d5c75658d4b324
b3f3e422961d666b8905b1d4e63074ff44127a8c579c36e90efdd85f11c5c2aa
05b71ba27ed6359f9ed2caadbf154950c18829a491c5da868071a1ea9376f43b
4e38aa92191af686e5d23dd4b229bca018bdc6973e3cfa03fc0ffe13c50eb87e
4f4f4416f9a2e28040ff4feda375eb9ac680553dc45ff30fee71799ea6c19d7b
85f56f102acf557b4759b068b0a16190ec36eeac098472c812f9ac9bd5f72c7b
37d76cb5bb08886c0547e8178cd321ea50cee60967a2cc86b1d497d1571ee9a3
a866ea54f436fbc64be8cf3d2941a9558151ee9ea1ca3fc28a8b48d512de8b83
9cb0848b2a33dbaacfcbfbc734430161d65a3408e66ef4b369a9f3139a3e1b3c
635a3788da6df446da6af6d54f402ef416b533b355b79dcbecd09e12d90983b1
496928ee84843b94c9a89acf87ee43b50b94a3fe498335c106046c7c8c41e09c
664ebe3e83a4eee2050c98402eae1b53bc53532ac3b7550a51fc6ddd9f26f32d
07fe00fb0de293d16ce884fd2925853db0a0e2015056c548bb0d40af8ade587c
b84cedac3e5e517eae4d37b6add577fd766dcf5626d75a307a04f88c461edf9b
2180db86e0935a7c303d07eb7e063092aa7dc156dc8fac3953f8fd363ae67f61
d884d75821203a8a1dd656f7caa2980ef3d2ef873b7968f4472fefc291d1caab
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.