MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6460dd52823e39140df9b3bf8dad990f85f0e540b2acbda6a1e6c683bfd14f64. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 15
| SHA256 hash: | 6460dd52823e39140df9b3bf8dad990f85f0e540b2acbda6a1e6c683bfd14f64 |
|---|---|
| SHA3-384 hash: | 429a0f93a06d331af0d5ef2785c9a40210ec4fa0fc95ced8ac3f164b505b11b257e828cabbee79f74164ab343a2a70e3 |
| SHA1 hash: | 867f4364ae63bb7ed0297e3ff1ef9644c736c5d0 |
| MD5 hash: | 01cbfd73e82f7b031cf5cfc9b5596ac3 |
| humanhash: | bravo-foxtrot-stream-five |
| File name: | 20230406141109.exe |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 710'656 bytes |
| First seen: | 2023-04-11 08:21:48 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'656 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger) |
| ssdeep | 12288:v/vzDnnFy2MB8tCsTaSylpxnAUf13xvZdOfeia79:fnF/MB83uRAUfldOGr7 |
| Threatray | 1'534 similar samples on MalwareBazaar |
| TLSH | T17FE4D0BCA7649A6FC9F844FC60095A68F7F1BD244181E3533E6476F7A7B33A98740242 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | 71e0cccce0ecf871 (5 x AgentTesla, 2 x SnakeKeylogger, 1 x PureCrypter) |
| Reporter | Anonymous |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
b578bb517ddeb734835e0b9be28bea6375baf24dd0af2e264d605f19c3a3a697
a688728d9378d9412d5dc8fc430442085d8252e4d4f6dcfd92cfa2bde64fc04e
ae8ae303cd239daf6e1766b4f7b5ecae44a2ae9ef713bcdc8e633f4f8f9f6b2b
4675e5af20324e9fdeb1fa9153d40961c2e34f1f26ae2ef7acc3b22b471d2b56
275a5d67eb4e4f78c290a259d63cca1f0b9ea0a13abb0ff8b5eb36160f941a79
6460dd52823e39140df9b3bf8dad990f85f0e540b2acbda6a1e6c683bfd14f64
074f4cf5b5fa0260e1fc48c591ee900246aa3cc382e3019c55cde7aea428b508
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Disable_Defender |
|---|---|
| Author: | iam-py-test |
| Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | MALWARE_Win_SnakeKeylogger |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Snake Keylogger |
| Rule name: | MAL_Envrial_Jan18_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | MAL_Envrial_Jan18_1_RID2D8C |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Encrial credential stealer malware |
| Reference: | https://twitter.com/malwrhunterteam/status/953313514629853184 |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
| Rule name: | XWorm_Hunter |
|---|---|
| Author: | Potato |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.