MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 67afaa018db220d0df98af446fd9e47ff8f9093cbd17e8c100119a1efb9b2288. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
SnakeKeylogger
Vendor detections: 19
| SHA256 hash: | 67afaa018db220d0df98af446fd9e47ff8f9093cbd17e8c100119a1efb9b2288 |
|---|---|
| SHA3-384 hash: | fcc9adc9741db95e490e33a0b2832c85a42cf4d3302a9e7f6dae1be3f20b4ef60d2532315523697367c6e5aa134eb60c |
| SHA1 hash: | 532ccb67f65658aed7b52bb090cbee9a61b25002 |
| MD5 hash: | 7722a6c6a62e793a5800925f63b0ce00 |
| humanhash: | paris-maine-quiet-hotel |
| File name: | 67afaa018db220d0df98af446fd9e47ff8f9093cbd17e8c100119a1efb9b2288 |
| Download: | download sample |
| Signature | SnakeKeylogger |
| File size: | 743'424 bytes |
| First seen: | 2025-10-10 06:24:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:2KqOZQ8bFRHabheQhgxBV2J3Awnxb1LZVTO3hBXtgZP4b2BKVz/eT8gkpz:lRQ6vH5QhWBDuxbNZcvtgZP4SBK9G3G |
| Threatray | 3'449 similar samples on MalwareBazaar |
| TLSH | T180F4D0162F9DC9D9D0F2CAF60533D2B01E7C9E64AD52E2328ED53F9BF63E6508902152 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10522/11/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | exe SnakeKeylogger |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_AllMal_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication |
| Rule name: | crime_snake_keylogger |
|---|---|
| Author: | Rony (r0ny_123) |
| Description: | Detects Snake keylogger payload |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | Disable_Defender |
|---|---|
| Author: | iam-py-test |
| Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DotNetProcHook |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with potential process hoocking |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defender features |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | VIPKeyLogger |
|---|---|
| Author: | kevoreilly |
| Description: | Detects VIPKeyLogger Keylogger |
| Rule name: | Windows_Trojan_SnakeKeylogger_af3faa65 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.