MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5e0bc6f973c1752a54130fdb328a51b7a6694ad4eb8c1d96c60b8ac8cde7392d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 14


Intelligence 14 IOCs YARA 12 File information Comments 1

SHA256 hash: 5e0bc6f973c1752a54130fdb328a51b7a6694ad4eb8c1d96c60b8ac8cde7392d
SHA3-384 hash: 876ffbadaff482dfe8ec3dadc56a82c6203cf1cd7f0f76db02f65878daf0df0f89b4a166fbce89e2362aea46af174eac
SHA1 hash: 3f0d6bfb5d193dc0b814709a5597d715907c991c
MD5 hash: f7b67b097d979673dcfd3c1e8170e130
humanhash: may-sodium-rugby-pluto
File name:f7b67b097d979673dcfd3c1e8170e130
Download: download sample
Signature SnakeKeylogger
File size:706'048 bytes
First seen:2023-06-20 07:16:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 12288:+b903YRtuPM7q6bpw4dcZda/igJeJh61rW/JyliZlWqMrIOFl7ZCGmXbS8Q:+b903Yhzu4CZdOZJuylizWqMr5X/kbS
Threatray 5'182 similar samples on MalwareBazaar
TLSH T1B6E412245B86861BC02B1B784860F770A17C9EC9B762D3DF1DCB3C9BBD22BC9093551A
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 2b2555676501612b (15 x AgentTesla, 3 x Loki, 2 x Neshta)
Reporter zbetcheckin
Tags:32 exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
284
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SWIFT.doc
Verdict:
Malicious activity
Analysis date:
2023-06-20 06:19:44 UTC
Tags:
exploit cve-2017-11882 loader snake blackguard keylogger trojan evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Unauthorized injection to a recently created process
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
formbook packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw
Score:
96 / 100
Signature
Found malware configuration
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.SnakeStealer
Status:
Malicious
First seen:
2023-06-20 07:17:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Malware Config
C2 Extraction:
https://api.telegram.org/bot5738470399:AAEl1xY8CQoLfvnnvb8Ghc_dI459UJe2CS0/sendMessage?chat_id=6121826573
Unpacked files
SH256 hash:
bf30f7032a6e2fdd6a872718de569645dda2c9e734a4f90a77e5af9a58d75812
MD5 hash:
29432c0db5445ce74b8a1042234187af
SHA1 hash:
fdc1bce5c868fbaed48ff27b3cc73b752bc66e75
SH256 hash:
52f358d201e81d3a0391cedd3042e2f957555b77aa49559f7fb810bbb7673ba1
MD5 hash:
c785ddc46141af772c75101d17c46a41
SHA1 hash:
e248723b6f60cc7607980d07172b64c33b2b2f15
SH256 hash:
ccbe1fce01575d3083c67d791a7369d1208cd474972b191a83a33cfb1e362cc3
MD5 hash:
f3b8c9925f3f65bdd79ed01bfbc3f286
SHA1 hash:
c2b0696b0fffcf5c42d6011e7dabb37df3cabce8
Detections:
snake_keylogger
SH256 hash:
f5dfbff653e32a3bd2d215c3a33c91a62f59dabf2948f466debbd08099cccbfe
MD5 hash:
81d2bff53b5bf8640120138e8e98dd7a
SHA1 hash:
520fcfe3d3ece044c02624f05f7c151dc14833da
SH256 hash:
8f0f7359fff7158a374dbd1ee7d782fdf484b2cea14045382dc18ce8551e06bb
MD5 hash:
55644fef96cefa93858b7e5741b2ed04
SHA1 hash:
22b8c1c1ff3cbe9b84a73f9eaa6eedbb5d36d5b6
SH256 hash:
5e0bc6f973c1752a54130fdb328a51b7a6694ad4eb8c1d96c60b8ac8cde7392d
MD5 hash:
f7b67b097d979673dcfd3c1e8170e130
SHA1 hash:
3f0d6bfb5d193dc0b814709a5597d715907c991c
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_DotNetProcHook
Author:ditekSHen
Description:Detects executables with potential process hoocking
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:MALWARE_Win_SnakeKeylogger
Author:ditekSHen
Description:Detects Snake Keylogger
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth (Nextron Systems)
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:MAL_Envrial_Jan18_1_RID2D8C
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Trojan_SnakeKeylogger_af3faa65
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

SnakeKeylogger

Executable exe 5e0bc6f973c1752a54130fdb328a51b7a6694ad4eb8c1d96c60b8ac8cde7392d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-06-20 07:16:39 UTC

url : hxxp://194.180.48.59/chikwazx.exe