MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 67619fe06f87fa553cb3212de782bd30ad3ad93e44b00bc5667a9388e2414a14. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SnakeKeylogger


Vendor detections: 15


Intelligence 15 IOCs YARA 2 File information Comments

SHA256 hash: 67619fe06f87fa553cb3212de782bd30ad3ad93e44b00bc5667a9388e2414a14
SHA3-384 hash: bcb2cd310dd78c606ee04894961b93f6e1f29bc7213bcd274844185a9adffe1ef40deca169e474bf927ad1b046930649
SHA1 hash: a900caa073e052f9ca5e5a8818b9f83587ab1dcb
MD5 hash: 90cb08ebdeec284fabd0b526c3a2c56c
humanhash: emma-johnny-florida-wyoming
File name:Balance payment-Invoice.pdf.exe
Download: download sample
Signature SnakeKeylogger
File size:954'368 bytes
First seen:2023-03-01 18:44:26 UTC
Last seen:2023-03-01 20:29:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:xdYL7JFtADz1KGicUV2NgqY+AhUCLyj78/y+Lcf/LpJC5qrFcHk9muHA7jbItnTJ:xdYHQ/Y+AhUNuLSzp4wcHk9LAqT
Threatray 4'464 similar samples on MalwareBazaar
TLSH T123158DC637BDE122F8EBA172051411C93A39B5877212F53BAB33BB959601BFF7689500
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 3044b271f0e8e0ba (14 x SnakeKeylogger, 13 x AgentTesla, 4 x Formbook)
Reporter abuse_ch
Tags:exe SnakeKeylogger

Intelligence


File Origin
# of uploads :
2
# of downloads :
173
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Balance payment-Invoice.pdf.exe
Verdict:
Malicious activity
Analysis date:
2023-03-01 18:59:46 UTC
Tags:
snake keylogger trojan evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Snake Keylogger
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected Generic Downloader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Leonem
Status:
Malicious
First seen:
2023-03-01 18:45:11 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
18 of 25 (72.00%)
Threat level:
  5/5
Result
Malware family:
snakekeylogger
Score:
  10/10
Tags:
family:snakekeylogger collection keylogger spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Snake Keylogger
Snake Keylogger payload
Unpacked files
SH256 hash:
d460ea93792f2ff0c8af0ad7ec3e662a71677d532f8c87081cdc17645c3451b6
MD5 hash:
d2b7f8f40c8f89e7f2a6cf4f745ba0fa
SHA1 hash:
eac88c79a1728fe895e6228389f9db9e0737abac
SH256 hash:
e3f18d193cad25c25f9df55da70a96f51cded054796e4bdd17b94a82a3e9622f
MD5 hash:
5c48d2b2d8ef384fd711b97b6caa48d4
SHA1 hash:
e3fcba55fe9efb97a9366deec3cf61969832f392
Detections:
snake_keylogger
SH256 hash:
1ca385bd3f4ca0493e3efcd83451292b0add472eac326f2a16b1344c01ce9a55
MD5 hash:
941cefb61cfb63d2ba8b6331fc335213
SHA1 hash:
bf1fdb6224a5361d9231e6acd83454dae6a152b3
SH256 hash:
d06df7395d561e198f9b7c5481567116ff2e4c2e84437c018d2a2c8ea6c4ca37
MD5 hash:
0fb6061f7d37424fb9e6d0e76b019c19
SHA1 hash:
98a64bf7b459f032d6ec5793003bf61b5ae1dd74
SH256 hash:
9b5442d4740810035b46201656ff8efa42c3db347dba5fb394ca14eed1968fa2
MD5 hash:
703038e63f3b2bdd5a3162d545be354a
SHA1 hash:
41f6fa50e23d20ee448ad069604cb00f82083b6c
SH256 hash:
67619fe06f87fa553cb3212de782bd30ad3ad93e44b00bc5667a9388e2414a14
MD5 hash:
90cb08ebdeec284fabd0b526c3a2c56c
SHA1 hash:
a900caa073e052f9ca5e5a8818b9f83587ab1dcb
Malware family:
SnakeKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments