MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 63d84d7c82a48d191d9ec89011493738347a206d68b07a03c5dfdbd2a23830a7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 15


Intelligence 15 IOCs YARA 3 File information Comments

SHA256 hash: 63d84d7c82a48d191d9ec89011493738347a206d68b07a03c5dfdbd2a23830a7
SHA3-384 hash: 7784f1a0559405049b4f6137504aba6984795d70aff7d766fa78644afe42fbc7b7e07e6b99e2e9c96b4c495a0c0a3307
SHA1 hash: d4b501ecc5682272505032f04b85726db78ce2be
MD5 hash: eab2046180ed624253933b1c32b1f879
humanhash: east-mirror-ohio-california
File name:Confirmación de recibo de transferencia.exe
Download: download sample
Signature SnakeKeylogger
File size:572'928 bytes
First seen:2023-04-25 15:31:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 12288:SQU41ha+nwWOVdBUSbMqycxngJEEmV6inaSKErwe4Ec:ESa+wtMcpgJE5IErb4
Threatray 4'946 similar samples on MalwareBazaar
TLSH T17AC4CFCEE24D02B5DF9EE6B14FD5AB5729C6D2D32A207CA83A3C45B4E14E72D7B40181
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
1
# of downloads :
262
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Creating a process from a recently created file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
Snake Keylogger, StormKitty
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Contains functionality to register a low level keyboard hook
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-04-25 03:32:33 UTC
File Type:
PE (.Net Exe)
Extracted files:
11
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:snakekeylogger family:stormkitty collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
StormKitty
StormKitty payload
Unpacked files
SH256 hash:
e89e0605b2c4671df9d27ad9e3a68c32232d0dedb3e55935b3c175102c3f69cf
MD5 hash:
50eed4d52c055066eaaa694453637786
SHA1 hash:
b88630a787a3903a577fee498645024f948b347d
SH256 hash:
8cabe4293dfe3202005ada5c4e1c5f70ac6141b8bc6f92847192bf8bd7ca46ab
MD5 hash:
93f96c6ba967b14e441d92519c5e2b8c
SHA1 hash:
6fb01b93b6fe6aeaf6f64c75ad2107087cc15990
SH256 hash:
2c119ecceebe0fd877fb491a19b4534911926db8d5b1e2099689a37a27ffa538
MD5 hash:
b50cb00f0e00140e533ed288405e82c3
SHA1 hash:
5ae4a07ea43218ed9831a4b2d5f46e2e57018a02
SH256 hash:
e5518e76f14e87bcc58a705c6f8f3a686cbffefc0e55985d17a067adfddf3688
MD5 hash:
920a2854e9c183ad2ef7d5543c296d38
SHA1 hash:
2c20da753bdf6f1a46261e2c132dd42f75c94229
SH256 hash:
63d84d7c82a48d191d9ec89011493738347a206d68b07a03c5dfdbd2a23830a7
MD5 hash:
eab2046180ed624253933b1c32b1f879
SHA1 hash:
d4b501ecc5682272505032f04b85726db78ce2be
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

SnakeKeylogger

Executable exe 63d84d7c82a48d191d9ec89011493738347a206d68b07a03c5dfdbd2a23830a7

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments