MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 614f64c6f6fb4e6a6bdb91333773972139b112937bff6a22e19c9a5d283b8097. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 12
| SHA256 hash: | 614f64c6f6fb4e6a6bdb91333773972139b112937bff6a22e19c9a5d283b8097 |
|---|---|
| SHA3-384 hash: | 92cf8ac7177e43578e368636abeb689dc09be77f8b7975e11ec3b240b36e11fb0d12baeace2d8432be19209fef2d3cf2 |
| SHA1 hash: | 67b090a0aab7e6452d4fba12f2d625e276402096 |
| MD5 hash: | 4c7fe9c4af3c08960d1490c0ba409694 |
| humanhash: | orange-timing-sierra-sad |
| File name: | 090008000000000000.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 1'212'928 bytes |
| First seen: | 2021-01-20 14:02:16 UTC |
| Last seen: | 2021-01-20 15:53:12 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'610 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 24576:0ehseo4PzLv0haNk1Wpa6rf6qIwVw8wvwdwGw4wFwwwowXw9w4wNw7w7wlwUwvwD:PLo47Lo41rfBQLWHi |
| Threatray | 2'220 similar samples on MalwareBazaar |
| TLSH | 9845E056A399E319E0BC08355C09FA1D6AD9B6DCB6290006CE96F16C7F397C3BC27706 |
| Reporter | |
| Tags: | exe SnakeKeylogger |
abuse_ch
Malspam distributing unidentified malware:HELO: hosted-by.rootlayer.net
Sending IP: 45.137.22.52
From: "Sareera Nunnuck"<sales@hplanners.com>
Subject: PO-INVOICE-0900000
Attachment: 090008000000000000.doc.z (contains "090008000000000000.exe")
Intelligence
File Origin
# of uploads :
2
# of downloads :
137
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
090008000000000000.exe
Verdict:
Malicious activity
Analysis date:
2021-01-20 14:36:04 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
AgentTeslaV2
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Launching a process
Creating a file in the %temp% directory
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Reading critical registry keys
Launching the process to change network settings
Connection attempt
Sending a UDP request
Creating a file
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AgentTesla Matiex Snake Keylogger
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus detection for dropped file
Bypasses PowerShell execution policy
Drops PE files to the startup folder
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Mail credentials (via file access)
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected Matiex Keylogger
Yara detected Snake Keylogger
Behaviour
Behavior Graph:
Detection:
agenttesla
Threat name:
ByteCode-MSIL.Trojan.Strictor
Status:
Malicious
First seen:
2021-01-20 09:12:54 UTC
AV detection:
10 of 45 (22.22%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
Similar samples:
+ 2'210 additional samples on MalwareBazaar
Result
Malware family:
snakekeylogger
Score:
10/10
Tags:
family:agenttesla family:matiex family:snakekeylogger keylogger ransomware spyware stealer trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
AgentTesla
Matiex
Matiex Main Payload
Snake Keylogger
Snake Keylogger Payload
Unpacked files
SH256 hash:
97024f17003dd3d31dab64c4d1b8251e50d428644eb59ed3692ad79ce42019cf
MD5 hash:
8cd28be4bd9a1404c6d3600db32b3ed1
SHA1 hash:
fb90b0ca51118e771390d58b19d0a404ee14cfbc
SH256 hash:
c2d3a6b20eb4bc377bf9be955b23615492786be0613373bfc7f440ab872a8142
MD5 hash:
e33e63bda6a3976ecadfa9ee6f096944
SHA1 hash:
68b683bb325ae9c21f471593f007c797a02dc497
SH256 hash:
5a46b373a0a0894870f5a63e52477dbe71e78efe35aa373c30d2edbdf3e35f9e
MD5 hash:
bd5fe63e3666a489e7a221647f6f3807
SHA1 hash:
52a8db03aa3db1b9a287688afeffa9f041c3811c
SH256 hash:
c1667fa6f6d37044c403c17010f36efc7e08d47ac2fb36a36b3c7e700eb97d81
MD5 hash:
eebb807f8a5a2d47c89648e4fb907f89
SHA1 hash:
35e8cbe02f0ce21492333604056e15bdbc923227
SH256 hash:
3fbc1a7a11a0fde2721df44878925884ddb76be0ad494d14fba8d986c2406a56
MD5 hash:
7aa3530964ff6c1d82b513055a9649a2
SHA1 hash:
2f95617d7857f1bd17085c254f46eec941bfdb6c
SH256 hash:
7670cd0bd65262b718cfdd15385829a06ddba1ea28a12ecc13e6521bf0d31094
MD5 hash:
0f5adb477779aad16328af35e02d49c9
SHA1 hash:
2c5239e714221ab7d724ffc8c237c6ba37fb9dae
SH256 hash:
e0b3bd3f2fadd3ef560c7dc1c13e1f50351e8df61139eb8e6367badf7689e71b
MD5 hash:
f615aa95251fc14492843942a588614c
SHA1 hash:
296669e81c271762d5068f8a9ecbb354ffc335c9
SH256 hash:
614f64c6f6fb4e6a6bdb91333773972139b112937bff6a22e19c9a5d283b8097
MD5 hash:
4c7fe9c4af3c08960d1490c0ba409694
SHA1 hash:
67b090a0aab7e6452d4fba12f2d625e276402096
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.