MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5f661d7ab85b73c7ee470cda8fff5192b97d7f25132639adf26a6b2e77f0366d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 19
| SHA256 hash: | 5f661d7ab85b73c7ee470cda8fff5192b97d7f25132639adf26a6b2e77f0366d |
|---|---|
| SHA3-384 hash: | 0419032e314c5c0a87df65a9ebdbeef1d50ab26b561add8a8449d6f0c5e2cc165d2c4a6815a094a342bd0edf02a8c796 |
| SHA1 hash: | 2becafde7835573b3b97300c65bb11679d4418f6 |
| MD5 hash: | 6ca33f9558140c7149106ed5fb7782be |
| humanhash: | arkansas-social-enemy-alabama |
| File name: | e-dekont.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 803'328 bytes |
| First seen: | 2025-09-25 07:45:55 UTC |
| Last seen: | 2025-10-09 14:45:11 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:VMrXS3Bwl4jhK8bwM2nFaSFET2S/68kwTxwKjMD+tiF3sRXH:8ABwgGMic8bOVkwdwdD+wypH |
| Threatray | 3'563 similar samples on MalwareBazaar |
| TLSH | T1CA05011222EDEB06C4B787F40570D3B567766ECA7522E3094EE27CEB7D36B421908297 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe geo SnakeKeylogger TUR |
Intelligence
File Origin
SEVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
ad8b1d399fe7a83f11c466782669ecef7c13d1dc53485db302dfca41d6b7354e
9957870d8b4fb238246540cf95e7c1b0a3a5d1ddb4d94628c4d6c11be9c7503e
3f1e1bc2b3ac94cbb03ff9942c8753b0a6ea0ce3e6b682727fb013ee873c3d04
26a2714342c817548962d1a9cf5ebb1aacb811c3060fea1269c8280047b8eddf
af3c9677ddb4f4989eefa3f4dbc7c2c61067adfde4203b106939e13def66ba22
5f661d7ab85b73c7ee470cda8fff5192b97d7f25132639adf26a6b2e77f0366d
e66437f20ac2fe570ad886d485354b997e873b9b7eb2ed2db00855e1b09f5e39
2398de60109f8d779ea501e83aef9d119cd05980b0c892514bf8e09d40b4e50d
47c0fc880c110b1df4895e9850fe358aa7e2464878f8e029eb4a51c868a4e92b
362f141bda759af6502f936adf999c6cf54fdc8d1951e103936ece788c3e0139
ae49e785cbda6ce29bcdd3f612351ca1ad9aa053c7cf784a60a3782b89a59108
fb9d538702d3455339c0388fdb21673a75e08710a4f1bd3bdd3d2f06a028065f
3acabc206916e37f01effd69271b72692cb07df3c1f94bf5d3db1aa688284210
e0b4de8edbfab9c43be6369f3a1ec256e417d76f5358c2846126bb1fc43eafcf
d7126aecb21ac24caf1637c63b1c33807da1aaeff976a77410fb1ab40ba96f9a
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.